Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-45803 (GCVE-0-2023-45803)
Vulnerability from cvelistv5 – Published: 2023-10-17 19:43 – Updated: 2025-11-03 21:49- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2025-11-03T21:49:53.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"name": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"name": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-45803",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-13T15:56:19.991921Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-13T15:56:30.487Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "urllib3",
"vendor": "urllib3",
"versions": [
{
"status": "affected",
"version": "\u003e= 2.0.0, \u003c 2.0.7"
},
{
"status": "affected",
"version": "\u003c 1.26.18"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-03T21:06:24.988Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"name": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"name": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"tags": [
"x_refsource_MISC"
],
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
}
],
"source": {
"advisory": "GHSA-g4mx-q9vg-27p4",
"discovery": "UNKNOWN"
},
"title": "Request body not stripped after redirect in urllib3"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-45803",
"datePublished": "2023-10-17T19:43:45.404Z",
"dateReserved": "2023-10-13T12:00:50.435Z",
"dateUpdated": "2025-11-03T21:49:53.115Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2023-45803",
"date": "2026-04-15",
"epss": "0.00051",
"percentile": "0.1577"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-45803\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-10-17T20:15:10.070\",\"lastModified\":\"2025-11-03T22:16:28.170\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.\"},{\"lang\":\"es\",\"value\":\"urllib3 es una librer\u00eda cliente HTTP f\u00e1cil de usar para Python. Anteriormente, urllib3 no eliminaba el cuerpo de la solicitud HTTP cuando una respuesta de redirecci\u00f3n HTTP usaba el estado 301, 302 o 303 despu\u00e9s de que la solicitud cambiara su m\u00e9todo de uno que pudiera aceptar un cuerpo de solicitud (como `POST`) a `GET` tal como est\u00e1. requerido por los RFC HTTP. Aunque este comportamiento no se especifica en la secci\u00f3n de redirecciones, se puede inferir reuniendo informaci\u00f3n de diferentes secciones y hemos observado el comportamiento en otras implementaciones importantes de clientes HTTP como curl y navegadores web. Debido a que la vulnerabilidad requiere que un servicio previamente confiable se vea comprometido para tener un impacto en la confidencialidad, creemos que la explotabilidad de esta vulnerabilidad es baja. Adem\u00e1s, muchos usuarios no colocan datos confidenciales en los cuerpos de solicitud HTTP; si este es el caso, entonces esta vulnerabilidad no es explotable. Las dos condiciones siguientes deben ser ciertas para verse afectado por esta vulnerabilidad: 1. Usar urllib3 y enviar informaci\u00f3n confidencial en el cuerpo de la solicitud HTTP (como datos de formulario o JSON) y 2. El servicio de origen est\u00e1 comprometido y comienza a redireccionar usando 301. 302 o 303 a un par malicioso o el servicio redirigido se ve comprometido. Este problema se solucion\u00f3 en las versiones 1.26.18 y 2.0.7 y se recomienda a los usuarios que actualicen para resolverlo. Los usuarios que no puedan actualizar deben deshabilitar los redireccionamientos para servicios que no esperan responder con redireccionamientos con `redirects=False` y deshabilitar los redireccionamientos autom\u00e1ticos con `redirects=False` y manejar los redireccionamientos 301, 302 y 303 manualmente eliminando el cuerpo de la solicitud HTTP.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":4.2,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":0.5,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-200\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.26.18\",\"matchCriteriaId\":\"3F2284A6-F467-4419-9AF7-9FFD133B04E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"2.0.7\",\"matchCriteriaId\":\"6A586164-F448-431C-8966-14E145A82BB5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]}],\"references\":[{\"url\":\"https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.rfc-editor.org/rfc/rfc9110.html#name-get\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://www.rfc-editor.org/rfc/rfc9110.html#name-get\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4\", \"name\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9\", \"name\": \"https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.rfc-editor.org/rfc/rfc9110.html#name-get\", \"name\": \"https://www.rfc-editor.org/rfc/rfc9110.html#name-get\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-11-03T21:49:53.115Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-45803\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-13T15:56:19.991921Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-13T15:56:25.915Z\"}}], \"cna\": {\"title\": \"Request body not stripped after redirect in urllib3\", \"source\": {\"advisory\": \"GHSA-g4mx-q9vg-27p4\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 4.2, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"urllib3\", \"product\": \"urllib3\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 2.0.0, \u003c 2.0.7\"}, {\"status\": \"affected\", \"version\": \"\u003c 1.26.18\"}]}], \"references\": [{\"url\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4\", \"name\": \"https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9\", \"name\": \"https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.rfc-editor.org/rfc/rfc9110.html#name-get\", \"name\": \"https://www.rfc-editor.org/rfc/rfc9110.html#name-get\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-200\", \"description\": \"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-11-03T21:06:24.988Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-45803\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-03T21:49:53.115Z\", \"dateReserved\": \"2023-10-13T12:00:50.435Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2023-10-17T19:43:45.404Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
OPENSUSE-SU-2024:13344-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-urllib3_1-1.26.18-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-urllib3_1-1.26.18-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13344",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13344-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45803/"
}
],
"title": "python310-urllib3_1-1.26.18-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13344-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3_1-1.26.18-1.1.aarch64",
"product": {
"name": "python310-urllib3_1-1.26.18-1.1.aarch64",
"product_id": "python310-urllib3_1-1.26.18-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-urllib3_1-1.26.18-1.1.aarch64",
"product": {
"name": "python311-urllib3_1-1.26.18-1.1.aarch64",
"product_id": "python311-urllib3_1-1.26.18-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-urllib3_1-1.26.18-1.1.aarch64",
"product": {
"name": "python39-urllib3_1-1.26.18-1.1.aarch64",
"product_id": "python39-urllib3_1-1.26.18-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3_1-1.26.18-1.1.ppc64le",
"product": {
"name": "python310-urllib3_1-1.26.18-1.1.ppc64le",
"product_id": "python310-urllib3_1-1.26.18-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-urllib3_1-1.26.18-1.1.ppc64le",
"product": {
"name": "python311-urllib3_1-1.26.18-1.1.ppc64le",
"product_id": "python311-urllib3_1-1.26.18-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-urllib3_1-1.26.18-1.1.ppc64le",
"product": {
"name": "python39-urllib3_1-1.26.18-1.1.ppc64le",
"product_id": "python39-urllib3_1-1.26.18-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3_1-1.26.18-1.1.s390x",
"product": {
"name": "python310-urllib3_1-1.26.18-1.1.s390x",
"product_id": "python310-urllib3_1-1.26.18-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-urllib3_1-1.26.18-1.1.s390x",
"product": {
"name": "python311-urllib3_1-1.26.18-1.1.s390x",
"product_id": "python311-urllib3_1-1.26.18-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-urllib3_1-1.26.18-1.1.s390x",
"product": {
"name": "python39-urllib3_1-1.26.18-1.1.s390x",
"product_id": "python39-urllib3_1-1.26.18-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3_1-1.26.18-1.1.x86_64",
"product": {
"name": "python310-urllib3_1-1.26.18-1.1.x86_64",
"product_id": "python310-urllib3_1-1.26.18-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-urllib3_1-1.26.18-1.1.x86_64",
"product": {
"name": "python311-urllib3_1-1.26.18-1.1.x86_64",
"product_id": "python311-urllib3_1-1.26.18-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-urllib3_1-1.26.18-1.1.x86_64",
"product": {
"name": "python39-urllib3_1-1.26.18-1.1.x86_64",
"product_id": "python39-urllib3_1-1.26.18-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3_1-1.26.18-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.aarch64"
},
"product_reference": "python310-urllib3_1-1.26.18-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3_1-1.26.18-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.ppc64le"
},
"product_reference": "python310-urllib3_1-1.26.18-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3_1-1.26.18-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.s390x"
},
"product_reference": "python310-urllib3_1-1.26.18-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3_1-1.26.18-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.x86_64"
},
"product_reference": "python310-urllib3_1-1.26.18-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3_1-1.26.18-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.aarch64"
},
"product_reference": "python311-urllib3_1-1.26.18-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3_1-1.26.18-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.ppc64le"
},
"product_reference": "python311-urllib3_1-1.26.18-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3_1-1.26.18-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.s390x"
},
"product_reference": "python311-urllib3_1-1.26.18-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3_1-1.26.18-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.x86_64"
},
"product_reference": "python311-urllib3_1-1.26.18-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3_1-1.26.18-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.aarch64"
},
"product_reference": "python39-urllib3_1-1.26.18-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3_1-1.26.18-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.ppc64le"
},
"product_reference": "python39-urllib3_1-1.26.18-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3_1-1.26.18-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.s390x"
},
"product_reference": "python39-urllib3_1-1.26.18-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3_1-1.26.18-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.x86_64"
},
"product_reference": "python39-urllib3_1-1.26.18-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45803"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.x86_64",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.x86_64",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45803",
"url": "https://www.suse.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "SUSE Bug 1216377 for CVE-2023-45803",
"url": "https://bugzilla.suse.com/1216377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.x86_64",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.x86_64",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python310-urllib3_1-1.26.18-1.1.x86_64",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3_1-1.26.18-1.1.x86_64",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.aarch64",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.ppc64le",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.s390x",
"openSUSE Tumbleweed:python39-urllib3_1-1.26.18-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-45803"
}
]
}
OPENSUSE-SU-2024:13343-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-urllib3-2.0.7-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-urllib3-2.0.7-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13343",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13343-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45803/"
}
],
"title": "python310-urllib3-2.0.7-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13343-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3-2.0.7-1.1.aarch64",
"product": {
"name": "python310-urllib3-2.0.7-1.1.aarch64",
"product_id": "python310-urllib3-2.0.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-urllib3-2.0.7-1.1.aarch64",
"product": {
"name": "python311-urllib3-2.0.7-1.1.aarch64",
"product_id": "python311-urllib3-2.0.7-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-urllib3-2.0.7-1.1.aarch64",
"product": {
"name": "python39-urllib3-2.0.7-1.1.aarch64",
"product_id": "python39-urllib3-2.0.7-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3-2.0.7-1.1.ppc64le",
"product": {
"name": "python310-urllib3-2.0.7-1.1.ppc64le",
"product_id": "python310-urllib3-2.0.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-urllib3-2.0.7-1.1.ppc64le",
"product": {
"name": "python311-urllib3-2.0.7-1.1.ppc64le",
"product_id": "python311-urllib3-2.0.7-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-urllib3-2.0.7-1.1.ppc64le",
"product": {
"name": "python39-urllib3-2.0.7-1.1.ppc64le",
"product_id": "python39-urllib3-2.0.7-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3-2.0.7-1.1.s390x",
"product": {
"name": "python310-urllib3-2.0.7-1.1.s390x",
"product_id": "python310-urllib3-2.0.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-urllib3-2.0.7-1.1.s390x",
"product": {
"name": "python311-urllib3-2.0.7-1.1.s390x",
"product_id": "python311-urllib3-2.0.7-1.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-urllib3-2.0.7-1.1.s390x",
"product": {
"name": "python39-urllib3-2.0.7-1.1.s390x",
"product_id": "python39-urllib3-2.0.7-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-urllib3-2.0.7-1.1.x86_64",
"product": {
"name": "python310-urllib3-2.0.7-1.1.x86_64",
"product_id": "python310-urllib3-2.0.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-urllib3-2.0.7-1.1.x86_64",
"product": {
"name": "python311-urllib3-2.0.7-1.1.x86_64",
"product_id": "python311-urllib3-2.0.7-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-urllib3-2.0.7-1.1.x86_64",
"product": {
"name": "python39-urllib3-2.0.7-1.1.x86_64",
"product_id": "python39-urllib3-2.0.7-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3-2.0.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.aarch64"
},
"product_reference": "python310-urllib3-2.0.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3-2.0.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.ppc64le"
},
"product_reference": "python310-urllib3-2.0.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3-2.0.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.s390x"
},
"product_reference": "python310-urllib3-2.0.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-urllib3-2.0.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.x86_64"
},
"product_reference": "python310-urllib3-2.0.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.0.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.aarch64"
},
"product_reference": "python311-urllib3-2.0.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.0.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.ppc64le"
},
"product_reference": "python311-urllib3-2.0.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.0.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.s390x"
},
"product_reference": "python311-urllib3-2.0.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-urllib3-2.0.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.x86_64"
},
"product_reference": "python311-urllib3-2.0.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-2.0.7-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.aarch64"
},
"product_reference": "python39-urllib3-2.0.7-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-2.0.7-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.ppc64le"
},
"product_reference": "python39-urllib3-2.0.7-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-2.0.7-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.s390x"
},
"product_reference": "python39-urllib3-2.0.7-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-2.0.7-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.x86_64"
},
"product_reference": "python39-urllib3-2.0.7-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45803"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.x86_64",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.x86_64",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45803",
"url": "https://www.suse.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "SUSE Bug 1216377 for CVE-2023-45803",
"url": "https://bugzilla.suse.com/1216377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.x86_64",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.x86_64",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python310-urllib3-2.0.7-1.1.x86_64",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python311-urllib3-2.0.7-1.1.x86_64",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.aarch64",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.ppc64le",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.s390x",
"openSUSE Tumbleweed:python39-urllib3-2.0.7-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-45803"
}
]
}
RHSA-2024:11238
Vulnerability from csaf_redhat - Published: 2024-12-17 19:56 - Updated: 2026-04-01 19:06A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:11238",
"url": "https://access.redhat.com/errata/RHSA-2024:11238"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_11238.json"
}
],
"title": "Red Hat Security Advisory: python3.11-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:06:25+00:00",
"generator": {
"date": "2026-04-01T19:06:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:11238",
"initial_release_date": "2024-12-17T19:56:48+00:00",
"revision_history": [
{
"date": "2024-12-17T19:56:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-12-17T19:56:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:06:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9_5.2.src",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_5.2.src",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9_5.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9_5.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9_5.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_5.2.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.src"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9_5.2.src",
"relates_to_product_reference": "AppStream-9.5.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-17T19:56:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11238"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.noarch",
"AppStream-9.5.0.Z.MAIN:python3.11-urllib3-0:1.26.12-2.el9_5.2.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:11189
Vulnerability from csaf_redhat - Published: 2024-12-17 19:01 - Updated: 2026-04-01 19:06A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:11189",
"url": "https://access.redhat.com/errata/RHSA-2024:11189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_11189.json"
}
],
"title": "Red Hat Security Advisory: python3.11-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:06:25+00:00",
"generator": {
"date": "2026-04-01T19:06:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:11189",
"initial_release_date": "2024-12-17T19:01:28+00:00",
"revision_history": [
{
"date": "2024-12-17T19:01:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-12-17T19:01:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:06:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-5.el8_10.src",
"product": {
"name": "python3.11-urllib3-0:1.26.12-5.el8_10.src",
"product_id": "python3.11-urllib3-0:1.26.12-5.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-5.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"product": {
"name": "python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"product_id": "python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-5.el8_10?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-5.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.noarch"
},
"product_reference": "python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-5.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.src"
},
"product_reference": "python3.11-urllib3-0:1.26.12-5.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-12-17T19:01:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:11189"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.noarch",
"AppStream-8.10.0.Z.MAIN.EUS:python3.11-urllib3-0:1.26.12-5.el8_10.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:0588
Vulnerability from csaf_redhat - Published: 2024-01-30 13:27 - Updated: 2026-04-01 19:03A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0588",
"url": "https://access.redhat.com/errata/RHSA-2024:0588"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0588.json"
}
],
"title": "Red Hat Security Advisory: python-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:03:15+00:00",
"generator": {
"date": "2026-04-01T19:03:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:0588",
"initial_release_date": "2024-01-30T13:27:51+00:00",
"revision_history": [
{
"date": "2024-01-30T13:27:51+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-30T13:27:51+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:03:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"product": {
"name": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"product_id": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.24.2-5.el8_8.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"product": {
"name": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"product_id": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.24.2-5.el8_8.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.24.2-5.el8_8.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src"
},
"product_reference": "python-urllib3-0:1.24.2-5.el8_8.1.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
},
"product_reference": "python3-urllib3-0:1.24.2-5.el8_8.1.noarch",
"relates_to_product_reference": "BaseOS-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:27:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0588"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-30T13:27:51+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0588"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.8.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_8.1.src",
"BaseOS-8.8.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_8.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:2132
Vulnerability from csaf_redhat - Published: 2024-04-30 09:56 - Updated: 2026-04-01 18:56A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.
A cross-site scripting (XSS) flaw was found in Jinja2 due to the xmlattr filter allowing keys with spaces, contrary to XML/HTML attribute standards. If an application accepts user-input keys and renders them for other users, attackers can inject additional attributes, potentially leading to XSS. This misuse of the xmlattr filter enables the injection of arbitrary HTML attributes, bypassing auto-escaping and potentially circumventing attribute validation checks.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\n* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)\n\n* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2132",
"url": "https://access.redhat.com/errata/RHSA-2024:2132"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.4_release_notes/index"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "2257854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854"
},
{
"category": "external",
"summary": "RHEL-14030",
"url": "https://issues.redhat.com/browse/RHEL-14030"
},
{
"category": "external",
"summary": "RHEL-5396",
"url": "https://issues.redhat.com/browse/RHEL-5396"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2132.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security and bug fix update",
"tracking": {
"current_release_date": "2026-04-01T18:56:39+00:00",
"generator": {
"date": "2026-04-01T18:56:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:2132",
"initial_release_date": "2024-04-30T09:56:20+00:00",
"revision_history": [
{
"date": "2024-04-30T09:56:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-04-30T09:56:20+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:56:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-all-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-all-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-aws-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-aws-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-gce-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-gce-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-0:4.10.0-62.el9.x86_64",
"product": {
"name": "ha-cloud-support-0:4.10.0-62.el9.x86_64",
"product_id": "ha-cloud-support-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"product": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"product_id": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-compute-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-compute-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"product_id": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virt-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virt-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-62.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"product": {
"name": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"product_id": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-62.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-all-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-all-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-62.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-62.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-62.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-62.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-62.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-62.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-62.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"product_id": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-62.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-all-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-all-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-62.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-62.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-all-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-all-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-kdump-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-redfish-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-zvm-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-zvm-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-62.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"product_id": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-62.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-apc-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-apc-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-brocade-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-brocade-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-drac5-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-drac5-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-emerson-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-emerson-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-eps-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-eps-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-lpar-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-lpar-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-mpath-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-mpath-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-rsa-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-rsa-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-rsb-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-rsb-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-sbd-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-sbd-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-scsi-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-scsi-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-wti-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-wti-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-common-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-common-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-62.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.10.0-62.el9.noarch",
"product": {
"name": "fence-agents-virsh-0:4.10.0-62.el9.noarch",
"product_id": "fence-agents-virsh-0:4.10.0-62.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-62.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.10.0-62.el9.src",
"product": {
"name": "fence-agents-0:4.10.0-62.el9.src",
"product_id": "fence-agents-0:4.10.0-62.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.10.0-62.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-62.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src"
},
"product_reference": "fence-agents-0:4.10.0-62.el9.src",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-62.el9.src as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src"
},
"product_reference": "fence-agents-0:4.10.0-62.el9.src",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 9)",
"product_id": "HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "HighAvailability-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-62.el9.src as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src"
},
"product_reference": "fence-agents-0:4.10.0-62.el9.src",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-62.el9.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-62.el9.noarch",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-62.el9.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-62.el9.s390x",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 9)",
"product_id": "ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"relates_to_product_reference": "ResilientStorage-9.4.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:56:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2132"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
},
{
"cve": "CVE-2023-52323",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2024-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite ship affected version of pycryptodome for pulp_container, however, product is not vulnerable as it doesn\u0027t utilize OAEP algorithm technique. Red Hat Product Security has classified its impact as Low for Red Hat Satellite; future updates expected to address this issue.\n\nRed Hat OpenStack 16.1 and 16.2 versions include affected python-scciclient embedded through the python-crypto package, however, python-scciclient employs only one algorithm, which is AES. While the version of python-crypto we ship may be susceptible to a particular CVE, since affected algorithms are not utilized by OpenStack, the attack cannot be executed to exploit an OpenStack deployment",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52323"
},
{
"category": "external",
"summary": "RHBZ#2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323"
},
{
"category": "external",
"summary": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst",
"url": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst"
},
{
"category": "external",
"summary": "https://pypi.org/project/pycryptodomex/#history",
"url": "https://pypi.org/project/pycryptodomex/#history"
}
],
"release_date": "2024-01-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:56:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2132"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2024-01-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257854"
}
],
"notes": [
{
"category": "description",
"text": "A cross-site scripting (XSS) flaw was found in Jinja2 due to the xmlattr filter allowing keys with spaces, contrary to XML/HTML attribute standards. If an application accepts user-input keys and renders them for other users, attackers can inject additional attributes, potentially leading to XSS. This misuse of the xmlattr filter enables the injection of arbitrary HTML attributes, bypassing auto-escaping and potentially circumventing attribute validation checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified issue is classified as moderate due to a cross-site scripting (XSS) vulnerability in Jinja2. This flaw arises from the xmlattr filter, which permits keys with spaces, contrary to XML/HTML attribute standards. In scenarios where an application accepts user-input keys and renders them for other users, attackers can exploit this vulnerability to inject additional attributes, potentially resulting in XSS attacks. The misuse of the xmlattr filter facilitates the injection of arbitrary HTML attributes, allowing attackers to bypass auto-escaping mechanisms and potentially evade attribute validation checks, posing a moderate security risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-22195"
},
{
"category": "external",
"summary": "RHBZ#2257854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195"
},
{
"category": "external",
"summary": "https://github.com/pallets/jinja/releases/tag/3.1.3",
"url": "https://github.com/pallets/jinja/releases/tag/3.1.3"
},
{
"category": "external",
"summary": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95",
"url": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95"
}
],
"release_date": "2024-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-04-30T09:56:20+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2132"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"AppStream-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"AppStream-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"AppStream-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"AppStream-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"HighAvailability-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"HighAvailability-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"HighAvailability-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"HighAvailability-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-0:4.10.0-62.el9.src",
"ResilientStorage-9.4.0.GA:fence-agents-aliyun-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-all-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-amt-ws-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-apc-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-aws-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-azure-arm-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-bladecenter-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-brocade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-mds-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-cisco-ucs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-common-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-compute-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-debugsource-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-drac5-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eaton-snmp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-emerson-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-eps-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-gce-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-heuristics-ping-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-hpblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-powervs-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibm-vpc-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ibmblade-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ifmib-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-moonshot-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-mp-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo-ssh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ilo2-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-intelmodular-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipdu-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-ipmilan-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kdump-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-kubevirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-lpar-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-mpath-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-openstack-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.aarch64",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.ppc64le",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-agents-redfish-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-agents-rhevm-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsa-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-rsb-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-sbd-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-scsi-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-virsh-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-rest-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-vmware-soap-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-wti-0:4.10.0-62.el9.noarch",
"ResilientStorage-9.4.0.GA:fence-agents-zvm-0:4.10.0-62.el9.s390x",
"ResilientStorage-9.4.0.GA:fence-virt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-cpg-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-libvirt-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-multicast-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-serial-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:fence-virtd-tcp-debuginfo-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-0:4.10.0-62.el9.x86_64",
"ResilientStorage-9.4.0.GA:ha-cloud-support-debuginfo-0:4.10.0-62.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter"
}
]
}
RHSA-2025:1813
Vulnerability from csaf_redhat - Published: 2025-02-25 11:30 - Updated: 2026-04-01 19:06A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:1813",
"url": "https://access.redhat.com/errata/RHSA-2025:1813"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1813.json"
}
],
"title": "Red Hat Security Advisory: python3.11-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:06:42+00:00",
"generator": {
"date": "2026-04-01T19:06:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2025:1813",
"initial_release_date": "2025-02-25T11:30:52+00:00",
"revision_history": [
{
"date": "2025-02-25T11:30:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-02-25T11:30:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:06:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-1.el9_2.1.src",
"product": {
"name": "python3.11-urllib3-0:1.26.12-1.el9_2.1.src",
"product_id": "python3.11-urllib3-0:1.26.12-1.el9_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-1.el9_2.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"product": {
"name": "python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"product_id": "python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-1.el9_2.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch"
},
"product_reference": "python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-1.el9_2.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
"product_id": "AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.src"
},
"product_reference": "python3.11-urllib3-0:1.26.12-1.el9_2.1.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-25T11:30:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1813"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.noarch",
"AppStream-9.2.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el9_2.1.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:1155
Vulnerability from csaf_redhat - Published: 2024-03-05 18:14 - Updated: 2026-04-01 18:56A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.
A cross-site scripting (XSS) flaw was found in Jinja2 due to the xmlattr filter allowing keys with spaces, contrary to XML/HTML attribute standards. If an application accepts user-input keys and renders them for other users, attackers can inject additional attributes, potentially leading to XSS. This misuse of the xmlattr filter enables the injection of arbitrary HTML attributes, bypassing auto-escaping and potentially circumventing attribute validation checks.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\n* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)\n\n* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1155",
"url": "https://access.redhat.com/errata/RHSA-2024:1155"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "2257854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1155.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security update",
"tracking": {
"current_release_date": "2026-04-01T18:56:39+00:00",
"generator": {
"date": "2026-04-01T18:56:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:1155",
"initial_release_date": "2024-03-05T18:14:02+00:00",
"revision_history": [
{
"date": "2024-03-05T18:14:02+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-05T18:14:02+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:56:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.10.0-20.el9_0.11.src",
"product": {
"name": "fence-agents-0:4.10.0-20.el9_0.11.src",
"product_id": "fence-agents-0:4.10.0-20.el9_0.11.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.10.0-20.el9_0.11?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.10.0-20.el9_0.11?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"product": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"product_id": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.10.0-20.el9_0.11?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.11?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virt-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-cpg-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-libvirt-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-multicast-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-serial-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-virtd-tcp-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-openstack-support-debuginfo@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.11?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"product": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"product_id": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/ha-cloud-support@4.10.0-20.el9_0.11?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.11?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.11?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.11?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.11?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.11?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.11?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.11?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.11?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.10.0-20.el9_0.11?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"product": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"product_id": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.10.0-20.el9_0.11?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.11.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.11.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.11.src as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.11.src",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux High Availability EUS (v.9.0)",
"product_id": "HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "HighAvailability-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.10.0-20.el9_0.11.src as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src"
},
"product_reference": "fence-agents-0:4.10.0-20.el9_0.11.src",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch"
},
"product_reference": "fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x"
},
"product_reference": "fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux Resilient Storage EUS (v.9.0)",
"product_id": "ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
},
"product_reference": "ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"relates_to_product_reference": "ResilientStorage-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-05T18:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1155"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
},
{
"cve": "CVE-2023-52323",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2024-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite ship affected version of pycryptodome for pulp_container, however, product is not vulnerable as it doesn\u0027t utilize OAEP algorithm technique. Red Hat Product Security has classified its impact as Low for Red Hat Satellite; future updates expected to address this issue.\n\nRed Hat OpenStack 16.1 and 16.2 versions include affected python-scciclient embedded through the python-crypto package, however, python-scciclient employs only one algorithm, which is AES. While the version of python-crypto we ship may be susceptible to a particular CVE, since affected algorithms are not utilized by OpenStack, the attack cannot be executed to exploit an OpenStack deployment",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52323"
},
{
"category": "external",
"summary": "RHBZ#2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323"
},
{
"category": "external",
"summary": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst",
"url": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst"
},
{
"category": "external",
"summary": "https://pypi.org/project/pycryptodomex/#history",
"url": "https://pypi.org/project/pycryptodomex/#history"
}
],
"release_date": "2024-01-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-05T18:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1155"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2024-01-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257854"
}
],
"notes": [
{
"category": "description",
"text": "A cross-site scripting (XSS) flaw was found in Jinja2 due to the xmlattr filter allowing keys with spaces, contrary to XML/HTML attribute standards. If an application accepts user-input keys and renders them for other users, attackers can inject additional attributes, potentially leading to XSS. This misuse of the xmlattr filter enables the injection of arbitrary HTML attributes, bypassing auto-escaping and potentially circumventing attribute validation checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified issue is classified as moderate due to a cross-site scripting (XSS) vulnerability in Jinja2. This flaw arises from the xmlattr filter, which permits keys with spaces, contrary to XML/HTML attribute standards. In scenarios where an application accepts user-input keys and renders them for other users, attackers can exploit this vulnerability to inject additional attributes, potentially resulting in XSS attacks. The misuse of the xmlattr filter facilitates the injection of arbitrary HTML attributes, allowing attackers to bypass auto-escaping mechanisms and potentially evade attribute validation checks, posing a moderate security risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-22195"
},
{
"category": "external",
"summary": "RHBZ#2257854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195"
},
{
"category": "external",
"summary": "https://github.com/pallets/jinja/releases/tag/3.1.3",
"url": "https://github.com/pallets/jinja/releases/tag/3.1.3"
},
{
"category": "external",
"summary": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95",
"url": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95"
}
],
"release_date": "2024-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-05T18:14:02+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1155"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"AppStream-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"AppStream-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"AppStream-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"AppStream-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"HighAvailability-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"HighAvailability-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"HighAvailability-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-0:4.10.0-20.el9_0.11.src",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aliyun-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-all-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-amt-ws-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-apc-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-aws-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-azure-arm-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-bladecenter-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-brocade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-mds-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-cisco-ucs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-common-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-compute-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-debugsource-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-drac5-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eaton-snmp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-emerson-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-eps-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-gce-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-heuristics-ping-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-hpblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-powervs-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibm-vpc-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ibmblade-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ifmib-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-moonshot-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-mp-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo-ssh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ilo2-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-intelmodular-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipdu-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-ipmilan-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kdump-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-kubevirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-lpar-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-mpath-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-openstack-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.aarch64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-redfish-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rhevm-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsa-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-rsb-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-sbd-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-scsi-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-virsh-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-rest-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-vmware-soap-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-wti-0:4.10.0-20.el9_0.11.noarch",
"ResilientStorage-9.0.0.Z.EUS:fence-agents-zvm-0:4.10.0-20.el9_0.11.s390x",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-cpg-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-libvirt-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-multicast-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-serial-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:fence-virtd-tcp-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-cloud-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-0:4.10.0-20.el9_0.11.x86_64",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.ppc64le",
"ResilientStorage-9.0.0.Z.EUS:ha-openstack-support-debuginfo-0:4.10.0-20.el9_0.11.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter"
}
]
}
RHSA-2024:1383
Vulnerability from csaf_redhat - Published: 2024-03-19 15:19 - Updated: 2026-04-06 13:49A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
A flaw was found in the HashiCorp Vault. The Vault and Vault Enterprise (“Vault”) LDAP auth method allows unauthenticated users to potentially enumerate valid accounts in the configured LDAP system by observing the response error when querying usernames.
A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.
A flaw was found in The HashiCorp Vault, which may be susceptible to a denial of service due to an unbounded consumption of memory when handling policy requests. This issue may allow an attacker to trigger policy checks by sending multiple inbound client requests that create a logger that is never removed from memory, leading to excessive memory consumption, causing a denial of service condition.
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.
A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.
An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.
The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.
A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where sudo improperly escapes terminal control characters during logging operations. As sudo's log messages may contain user-controlled strings, this may allow an attacker to inject terminal control commands, leading to a leak of restricted information.
A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where the "sudoreplay -l' command improperly escapes terminal control characters. As sudo's log messages may contain user-controlled strings, this could allow an attacker to inject terminal control commands, leading to a leak of restricted information.
A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.
A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.
A flaw was found in Golang. The html/template package did not properly handle HMTL-like "<!--" and "-->" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This issue may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped.
A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.
A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.
A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.
A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.
A vulnerability was found in the NPM IP Package. This flaw allows an attacker to perform arbitrary code execution and obtain sensitive information via the isPublic() function by inducing a Server-Side Request Forgery (SSRF) attack and obtaining access to normally inaccessible resources.
A flaw was found in the sudo package. This issue could allow a local authenticated attacker to cause a bit to flip, which enables fault injection and may authenticate as the root user.
A vulnerability was found in the get-func-name package in the chai module. Affected versions of this package are vulnerable to Regular expression denial of service (ReDoS) attacks, affecting system availability.
A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set "super cookies" in curl that are passed back to more origins than what is otherwise allowed or possible.
A Regular Expression Denial of Service (ReDoS) vulnerability was found in Adobe's css-tools when parsing CSS. This issue occurs due to improper input validation and may allow an attacker to use a carefully crafted input string to cause a denial of service, especially when attempting to parse CSS.
A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.
A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated packages that include numerous enhancements and bug fixes are now available for Red Hat OpenShift Data Foundation 4.15.0 on Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Data Foundation is software-defined storage integrated with and optimized for the Red Hat OpenShift Container Platform. Red Hat OpenShift Data Foundation is a highly scalable, production-grade persistent storage for stateful applications running in the Red Hat OpenShift Container Platform. In addition to persistent storage, Red Hat OpenShift Data Foundation provisions a multicloud data management service with an S3 compatible API.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nThese updated packages include numerous enhancements and bug fixes. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat OpenShift Data Foundation Release Notes for information on the most significant of these changes:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.15/html/4.15_release_notes/index\n\nAll Red Hat OpenShift Data Foundation users are advised to upgrade to these packages that provide these bug fixes and enhancements.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:1383",
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.15/html/4.15_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_openshift_data_foundation/4.15/html/4.15_release_notes/index"
},
{
"category": "external",
"summary": "2005835",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2005835"
},
{
"category": "external",
"summary": "2022467",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2022467"
},
{
"category": "external",
"summary": "2126028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2126028"
},
{
"category": "external",
"summary": "2130266",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2130266"
},
{
"category": "external",
"summary": "2151493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151493"
},
{
"category": "external",
"summary": "2165128",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165128"
},
{
"category": "external",
"summary": "2165907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165907"
},
{
"category": "external",
"summary": "2196858",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196858"
},
{
"category": "external",
"summary": "2207925",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207925"
},
{
"category": "external",
"summary": "2208302",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2208302"
},
{
"category": "external",
"summary": "2209616",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209616"
},
{
"category": "external",
"summary": "2210970",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2210970"
},
{
"category": "external",
"summary": "2213885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2213885"
},
{
"category": "external",
"summary": "2222254",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222254"
},
{
"category": "external",
"summary": "2228785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228785"
},
{
"category": "external",
"summary": "2229670",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2229670"
},
{
"category": "external",
"summary": "2231076",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231076"
},
{
"category": "external",
"summary": "2231860",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231860"
},
{
"category": "external",
"summary": "2233010",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2233010"
},
{
"category": "external",
"summary": "2234479",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2234479"
},
{
"category": "external",
"summary": "2236384",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236384"
},
{
"category": "external",
"summary": "2236400",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236400"
},
{
"category": "external",
"summary": "2237427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237427"
},
{
"category": "external",
"summary": "2237895",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237895"
},
{
"category": "external",
"summary": "2237903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237903"
},
{
"category": "external",
"summary": "2237920",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237920"
},
{
"category": "external",
"summary": "2239208",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239208"
},
{
"category": "external",
"summary": "2239590",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239590"
},
{
"category": "external",
"summary": "2239608",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2239608"
},
{
"category": "external",
"summary": "2240756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240756"
},
{
"category": "external",
"summary": "2240908",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240908"
},
{
"category": "external",
"summary": "2241268",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241268"
},
{
"category": "external",
"summary": "2241872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241872"
},
{
"category": "external",
"summary": "2242309",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242309"
},
{
"category": "external",
"summary": "2244568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244568"
},
{
"category": "external",
"summary": "2244569",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244569"
},
{
"category": "external",
"summary": "2244570",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244570"
},
{
"category": "external",
"summary": "2245004",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245004"
},
{
"category": "external",
"summary": "2246084",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246084"
},
{
"category": "external",
"summary": "2246993",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246993"
},
{
"category": "external",
"summary": "2247094",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247094"
},
{
"category": "external",
"summary": "2247313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247313"
},
{
"category": "external",
"summary": "2247518",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247518"
},
{
"category": "external",
"summary": "2247542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247542"
},
{
"category": "external",
"summary": "2247714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247714"
},
{
"category": "external",
"summary": "2247731",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247731"
},
{
"category": "external",
"summary": "2247743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247743"
},
{
"category": "external",
"summary": "2247748",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247748"
},
{
"category": "external",
"summary": "2248117",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248117"
},
{
"category": "external",
"summary": "2248664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248664"
},
{
"category": "external",
"summary": "2248666",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248666"
},
{
"category": "external",
"summary": "2248684",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248684"
},
{
"category": "external",
"summary": "2248832",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248832"
},
{
"category": "external",
"summary": "2249678",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249678"
},
{
"category": "external",
"summary": "2249844",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249844"
},
{
"category": "external",
"summary": "2250092",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250092"
},
{
"category": "external",
"summary": "2250152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250152"
},
{
"category": "external",
"summary": "2250636",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250636"
},
{
"category": "external",
"summary": "2250911",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250911"
},
{
"category": "external",
"summary": "2250995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250995"
},
{
"category": "external",
"summary": "2251741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251741"
},
{
"category": "external",
"summary": "2252035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252035"
},
{
"category": "external",
"summary": "2252756",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252756"
},
{
"category": "external",
"summary": "2253185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253185"
},
{
"category": "external",
"summary": "2253257",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253257"
},
{
"category": "external",
"summary": "2253953",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253953"
},
{
"category": "external",
"summary": "2254159",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254159"
},
{
"category": "external",
"summary": "2254216",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254216"
},
{
"category": "external",
"summary": "2254330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254330"
},
{
"category": "external",
"summary": "2254333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254333"
},
{
"category": "external",
"summary": "2254513",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254513"
},
{
"category": "external",
"summary": "2255036",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255036"
},
{
"category": "external",
"summary": "2255194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255194"
},
{
"category": "external",
"summary": "2255219",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255219"
},
{
"category": "external",
"summary": "2255232",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255232"
},
{
"category": "external",
"summary": "2255240",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255240"
},
{
"category": "external",
"summary": "2255241",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255241"
},
{
"category": "external",
"summary": "2255310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255310"
},
{
"category": "external",
"summary": "2255320",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255320"
},
{
"category": "external",
"summary": "2255328",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255328"
},
{
"category": "external",
"summary": "2255332",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255332"
},
{
"category": "external",
"summary": "2255333",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255333"
},
{
"category": "external",
"summary": "2255340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255340"
},
{
"category": "external",
"summary": "2255343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255343"
},
{
"category": "external",
"summary": "2255411",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255411"
},
{
"category": "external",
"summary": "2255491",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255491"
},
{
"category": "external",
"summary": "2255499",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255499"
},
{
"category": "external",
"summary": "2255501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255501"
},
{
"category": "external",
"summary": "2255508",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255508"
},
{
"category": "external",
"summary": "2255557",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255557"
},
{
"category": "external",
"summary": "2255586",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255586"
},
{
"category": "external",
"summary": "2255890",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255890"
},
{
"category": "external",
"summary": "2256085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256085"
},
{
"category": "external",
"summary": "2256161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256161"
},
{
"category": "external",
"summary": "2256456",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256456"
},
{
"category": "external",
"summary": "2256566",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256566"
},
{
"category": "external",
"summary": "2256580",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256580"
},
{
"category": "external",
"summary": "2256597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256597"
},
{
"category": "external",
"summary": "2256633",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256633"
},
{
"category": "external",
"summary": "2256637",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256637"
},
{
"category": "external",
"summary": "2256725",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256725"
},
{
"category": "external",
"summary": "2256777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256777"
},
{
"category": "external",
"summary": "2257222",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257222"
},
{
"category": "external",
"summary": "2257296",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257296"
},
{
"category": "external",
"summary": "2257310",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257310"
},
{
"category": "external",
"summary": "2257427",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257427"
},
{
"category": "external",
"summary": "2257441",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257441"
},
{
"category": "external",
"summary": "2257634",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257634"
},
{
"category": "external",
"summary": "2257674",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257674"
},
{
"category": "external",
"summary": "2257694",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257694"
},
{
"category": "external",
"summary": "2257711",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257711"
},
{
"category": "external",
"summary": "2257982",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257982"
},
{
"category": "external",
"summary": "2258015",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258015"
},
{
"category": "external",
"summary": "2258021",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258021"
},
{
"category": "external",
"summary": "2258351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258351"
},
{
"category": "external",
"summary": "2258357",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258357"
},
{
"category": "external",
"summary": "2258560",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258560"
},
{
"category": "external",
"summary": "2258591",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258591"
},
{
"category": "external",
"summary": "2258681",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258681"
},
{
"category": "external",
"summary": "2258744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258744"
},
{
"category": "external",
"summary": "2258814",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258814"
},
{
"category": "external",
"summary": "2258937",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258937"
},
{
"category": "external",
"summary": "2258974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258974"
},
{
"category": "external",
"summary": "2259187",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259187"
},
{
"category": "external",
"summary": "2259476",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259476"
},
{
"category": "external",
"summary": "2259632",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259632"
},
{
"category": "external",
"summary": "2259664",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259664"
},
{
"category": "external",
"summary": "2259773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259773"
},
{
"category": "external",
"summary": "2259852",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259852"
},
{
"category": "external",
"summary": "2260050",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260050"
},
{
"category": "external",
"summary": "2260131",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260131"
},
{
"category": "external",
"summary": "2260279",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260279"
},
{
"category": "external",
"summary": "2260340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260340"
},
{
"category": "external",
"summary": "2260818",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260818"
},
{
"category": "external",
"summary": "2261936",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2261936"
},
{
"category": "external",
"summary": "2262052",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262052"
},
{
"category": "external",
"summary": "2262252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262252"
},
{
"category": "external",
"summary": "2262376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262376"
},
{
"category": "external",
"summary": "2262974",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262974"
},
{
"category": "external",
"summary": "2263319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263319"
},
{
"category": "external",
"summary": "2263472",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263472"
},
{
"category": "external",
"summary": "2263984",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2263984"
},
{
"category": "external",
"summary": "2264002",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264002"
},
{
"category": "external",
"summary": "2264825",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264825"
},
{
"category": "external",
"summary": "2265051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265051"
},
{
"category": "external",
"summary": "2265109",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265109"
},
{
"category": "external",
"summary": "2265124",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265124"
},
{
"category": "external",
"summary": "2265514",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265514"
},
{
"category": "external",
"summary": "2266564",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266564"
},
{
"category": "external",
"summary": "2266583",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2266583"
},
{
"category": "external",
"summary": "2267209",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267209"
},
{
"category": "external",
"summary": "2267712",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267712"
},
{
"category": "external",
"summary": "2267857",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267857"
},
{
"category": "external",
"summary": "2267885",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2267885"
},
{
"category": "external",
"summary": "2268407",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268407"
},
{
"category": "external",
"summary": "2268959",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2268959"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1383.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift Data Foundation 4.15.0 security, enhancement, \u0026 bug fix update",
"tracking": {
"current_release_date": "2026-04-06T13:49:55+00:00",
"generator": {
"date": "2026-04-06T13:49:55+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:1383",
"initial_release_date": "2024-03-19T15:19:34+00:00",
"revision_history": [
{
"date": "2024-03-19T15:19:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-03-19T15:19:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-06T13:49:55+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHODF 4.15 for RHEL 9",
"product": {
"name": "RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_data_foundation:4.15::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Data Foundation"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"product": {
"name": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"product_id": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel9\u0026tag=v4.15.0-37"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"product_id": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"product_id": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"product_id": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"product": {
"name": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"product_id": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-client-console-rhel9\u0026tag=v4.15.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"product": {
"name": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"product_id": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-client-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"product": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"product_id": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel9\u0026tag=v4.15.0-81"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"product_id": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"product_id": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16?arch=s390x\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"product_id": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"product": {
"name": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"product_id": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel9\u0026tag=v4.15.0-57"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"product": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"product_id": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-cosi-sidecar-rhel9\u0026tag=v4.15.0-6"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"product": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"product_id": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel9\u0026tag=v4.15.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"product_id": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"product": {
"name": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"product_id": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"product_id": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"product_id": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"product_id": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08?arch=s390x\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"product": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"product_id": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0?arch=s390x\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel9-operator\u0026tag=v4.15.0-103"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"product": {
"name": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"product_id": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14?arch=amd64\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel9\u0026tag=v4.15.0-37"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"product_id": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"product_id": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"product_id": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af?arch=amd64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"product": {
"name": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"product_id": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-client-console-rhel9\u0026tag=v4.15.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"product": {
"name": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"product_id": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-client-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"product": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"product_id": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel9\u0026tag=v4.15.0-81"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"product_id": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"product_id": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725?arch=amd64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"product_id": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"product": {
"name": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"product_id": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel9\u0026tag=v4.15.0-57"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"product": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"product_id": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-cosi-sidecar-rhel9\u0026tag=v4.15.0-6"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"product": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"product_id": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel9\u0026tag=v4.15.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"product_id": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"product": {
"name": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"product_id": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"product_id": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"product_id": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"product_id": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60?arch=amd64\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"product": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"product_id": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a?arch=amd64\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel9-operator\u0026tag=v4.15.0-103"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"product": {
"name": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"product_id": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/cephcsi-rhel9\u0026tag=v4.15.0-37"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"product_id": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"product": {
"name": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"product_id": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"product_id": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"product": {
"name": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"product_id": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-client-console-rhel9\u0026tag=v4.15.0-58"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"product": {
"name": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"product_id": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-client-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"product": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"product_id": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-metrics-exporter-rhel9\u0026tag=v4.15.0-81"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"product": {
"name": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"product_id": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"product_id": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"product_id": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"product": {
"name": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"product_id": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-console-rhel9\u0026tag=v4.15.0-57"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"product": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"product_id": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-cosi-sidecar-rhel9\u0026tag=v4.15.0-6"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"product_id": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"product": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"product_id": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-console-rhel9\u0026tag=v4.15.0-54"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"product": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"product_id": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"product_id": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"product": {
"name": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"product_id": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"product_id": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"product": {
"name": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"product_id": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-cluster-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"product": {
"name": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"product_id": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-hub-operator-bundle\u0026tag=v4.15.0-158"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"product_id": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
},
{
"category": "product_version",
"name": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"product": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"product_id": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91?arch=ppc64le\u0026repository_url=registry.redhat.io/odf4/rook-ceph-rhel9-operator\u0026tag=v4.15.0-103"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"product": {
"name": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"product_id": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e?arch=arm64\u0026repository_url=registry.redhat.io/odf4/mcg-core-rhel9\u0026tag=v4.15.0-68"
}
}
},
{
"category": "product_version",
"name": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"product": {
"name": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"product_id": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"product_identification_helper": {
"purl": "pkg:oci/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872?arch=arm64\u0026repository_url=registry.redhat.io/odf4/mcg-rhel9-operator\u0026tag=v4.15.0-39"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"product": {
"name": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"product_id": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708?arch=arm64\u0026repository_url=registry.redhat.io/odf4/ocs-client-rhel9-operator\u0026tag=v4.15.0-13"
}
}
},
{
"category": "product_version",
"name": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"product": {
"name": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"product_id": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"product_identification_helper": {
"purl": "pkg:oci/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198?arch=arm64\u0026repository_url=registry.redhat.io/odf4/ocs-rhel9-operator\u0026tag=v4.15.0-79"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"product": {
"name": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"product_id": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-cli-rhel9\u0026tag=v4.15.0-22"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"product": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"product_id": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-rhel9-operator\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"product": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"product_id": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-csi-addons-sidecar-rhel9\u0026tag=v4.15.0-15"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"product": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"product_id": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-multicluster-rhel9-operator\u0026tag=v4.15.0-10"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"product": {
"name": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"product_id": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-must-gather-rhel9\u0026tag=v4.15.0-26"
}
}
},
{
"category": "product_version",
"name": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"product": {
"name": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"product_id": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odf-rhel9-operator\u0026tag=v4.15.0-19"
}
}
},
{
"category": "product_version",
"name": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"product": {
"name": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"product_id": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"product_identification_helper": {
"purl": "pkg:oci/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9?arch=arm64\u0026repository_url=registry.redhat.io/odf4/odr-rhel9-operator\u0026tag=v4.15.0-21"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64"
},
"product_reference": "odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x"
},
"product_reference": "odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
},
"product_reference": "odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64"
},
"product_reference": "odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le"
},
"product_reference": "odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x"
},
"product_reference": "odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64"
},
"product_reference": "odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le"
},
"product_reference": "odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x"
},
"product_reference": "odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x"
},
"product_reference": "odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64"
},
"product_reference": "odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le"
},
"product_reference": "odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le"
},
"product_reference": "odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x"
},
"product_reference": "odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le"
},
"product_reference": "odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64"
},
"product_reference": "odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x"
},
"product_reference": "odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64"
},
"product_reference": "odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64"
},
"product_reference": "odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x"
},
"product_reference": "odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64"
},
"product_reference": "odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
},
"product_reference": "odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x"
},
"product_reference": "odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64"
},
"product_reference": "odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le"
},
"product_reference": "odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x"
},
"product_reference": "odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x"
},
"product_reference": "odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le"
},
"product_reference": "odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le"
},
"product_reference": "odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64"
},
"product_reference": "odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x"
},
"product_reference": "odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le"
},
"product_reference": "odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x"
},
"product_reference": "odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64"
},
"product_reference": "odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le"
},
"product_reference": "odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64"
},
"product_reference": "odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x"
},
"product_reference": "odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64"
},
"product_reference": "odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le"
},
"product_reference": "odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le"
},
"product_reference": "odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64"
},
"product_reference": "odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le"
},
"product_reference": "odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x"
},
"product_reference": "odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"relates_to_product_reference": "9Base-RHODF-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64 as a component of RHODF 4.15 for RHEL 9",
"product_id": "9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
},
"product_reference": "odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64",
"relates_to_product_reference": "9Base-RHODF-4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-35937",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"discovery_date": "2021-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964125"
}
],
"notes": [
{
"category": "description",
"text": "A race condition vulnerability was found in rpm. A local unprivileged user could use this flaw to bypass the checks that were introduced in response to CVE-2017-7500 and CVE-2017-7501, potentially gaining root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: TOCTOU race in checks for unsafe symlinks",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "System and service accounts may have the required permissions to exploit this flaw. Conversely, regular user accounts should not be allowed to manipulate RPM artifacts during installation, thus reducing the attack surface and hence the impact of this flaw considerably.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-35937"
},
{
"category": "external",
"summary": "RHBZ#1964125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35937",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35937"
}
],
"release_date": "2021-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: TOCTOU race in checks for unsafe symlinks"
},
{
"cve": "CVE-2021-35938",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2021-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964114"
}
],
"notes": [
{
"category": "description",
"text": "A symbolic link issue was found in rpm. It occurs when rpm sets the desired permissions and credentials after installing a file. A local unprivileged user could use this flaw to exchange the original file with a symbolic link to a security-critical file and escalate their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: races with chown/chmod/capabilities calls during installation",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "System and service accounts may have the required permissions to exploit this flaw. Conversely, regular user accounts should not be allowed to manipulate RPM artifacts during installation, thus reducing the attack surface and hence the impact of this flaw considerably.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-35938"
},
{
"category": "external",
"summary": "RHBZ#1964114",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964114"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35938",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35938"
},
{
"category": "external",
"summary": "https://rpm.org/wiki/Releases/4.18.0",
"url": "https://rpm.org/wiki/Releases/4.18.0"
}
],
"release_date": "2021-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: races with chown/chmod/capabilities calls during installation"
},
{
"cve": "CVE-2021-35939",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2021-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1964129"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the fix for CVE-2017-7500 and CVE-2017-7501 was incomplete: the check was only implemented for the parent directory of the file to be created. A local unprivileged user who owns another ancestor directory could potentially use this flaw to gain root privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: checks for unsafe symlinks are not performed for intermediary directories",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "System and service accounts may have the required permissions to exploit this flaw. Conversely, regular user accounts should not be allowed to manipulate RPM artifacts during installation, thus reducing the attack surface and hence the impact of this flaw considerably.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-35939"
},
{
"category": "external",
"summary": "RHBZ#1964129",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1964129"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-35939",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-35939"
},
{
"category": "external",
"summary": "https://rpm.org/wiki/Releases/4.18.0",
"url": "https://rpm.org/wiki/Releases/4.18.0"
}
],
"release_date": "2021-06-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: checks for unsafe symlinks are not performed for intermediary directories"
},
{
"cve": "CVE-2023-3462",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2023-08-01T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228020"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the HashiCorp Vault. The Vault and Vault Enterprise (\u201cVault\u201d) LDAP auth method allows unauthenticated users to potentially enumerate valid accounts in the configured LDAP system by observing the response error when querying usernames.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Hashicorp/vault: Vault\u2019s LDAP Auth Method Allows for User Enumeration",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3462"
},
{
"category": "external",
"summary": "RHBZ#2228020",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228020"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3462"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3462",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3462"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714",
"url": "https://discuss.hashicorp.com/t/hcsec-2023-24-vaults-ldap-auth-method-allows-for-user-enumeration/56714"
}
],
"release_date": "2023-07-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Hashicorp/vault: Vault\u2019s LDAP Auth Method Allows for User Enumeration"
},
{
"acknowledgments": [
{
"names": [
"Tony Battersby"
],
"organization": "Cybernetics",
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2023-10-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2243839"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSL in how it processes key and initialization vector (IV) lengths. This issue can lead to potential truncation or overruns during the initialization of some symmetric ciphers. A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. Both truncations and overruns of the key and the IV will produce incorrect results and could, in some cases, trigger a memory exception.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssl: Incorrect cipher key and IV length processing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified bug in the processing of key and initialization vector (IV) lengths within certain symmetric cipher modes poses a moderate severity risk due to its potential impact on data confidentiality and integrity. While the truncation or overreading of key and IV lengths could lead to incorrect cryptographic operations and potential memory exceptions, the probability of exploitation is mitigated by several factors. Firstly, the affected API was recently introduced, limiting its widespread adoption. Secondly, altering key and IV lengths is not a common operation in most cryptographic implementations. Furthermore, the likelihood of vulnerability is reduced by the necessity for both communication peers to be similarly affected for decryption failures to occur, which would likely be detected during testing.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5363"
},
{
"category": "external",
"summary": "RHBZ#2243839",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243839"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5363",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5363"
},
{
"category": "external",
"summary": "https://www.openssl.org/news/secadv/20231024.txt",
"url": "https://www.openssl.org/news/secadv/20231024.txt"
}
],
"release_date": "2023-10-24T15:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssl: Incorrect cipher key and IV length processing"
},
{
"cve": "CVE-2023-5954",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2023-11-09T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2249115"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in The HashiCorp Vault, which may be susceptible to a denial of service due to an unbounded consumption of memory when handling policy requests. This issue may allow an attacker to trigger policy checks by sending multiple inbound client requests that create a logger that is never removed from memory, leading to excessive memory consumption, causing a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "vault: inbound client requests can trigger a denial of service",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5954"
},
{
"category": "external",
"summary": "RHBZ#2249115",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2249115"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5954"
},
{
"category": "external",
"summary": "https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926",
"url": "https://discuss.hashicorp.com/t/hcsec-2023-33-vault-requests-triggering-policy-checks-may-lead-to-unbounded-memory-consumption/59926"
}
],
"release_date": "2023-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "vault: inbound client requests can trigger a denial of service"
},
{
"acknowledgments": [
{
"names": [
"Daiki Ueno"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2023-11-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2248445"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: timing side-channel in the RSA-PSK authentication",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-5981"
},
{
"category": "external",
"summary": "RHBZ#2248445",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2248445"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5981",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5981"
},
{
"category": "external",
"summary": "https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23",
"url": "https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23"
}
],
"release_date": "2023-11-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "To address the issue found upgrade to GnuTLS 3.8.2 or later versions.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: timing side-channel in the RSA-PSK authentication"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2023-12-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256194"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in SQLite3. This issue affects the sessionReadRecord function of the ext/session/sqlite3session.c function in the make alltest Handler component. Manipulation may cause a heap-based buffer overflow to occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: heap-buffer-overflow at sessionfuzz",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as having a moderate impact because it affects a non-critical component, lacks details on an easy exploitation method, and doesn\u0027t indicate severe impacts (such as remote code execution). So the risk is reduced by exploitation complexity and the absence of a clear and severe threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-7104"
},
{
"category": "external",
"summary": "RHBZ#2256194",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256194"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-7104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-7104"
}
],
"release_date": "2023-12-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sqlite: heap-buffer-overflow at sessionfuzz"
},
{
"cve": "CVE-2023-24532",
"cwe": {
"id": "CWE-682",
"name": "Incorrect Calculation"
},
"discovery_date": "2023-07-17T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2223355"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the crypto/internal/nistec golang library. The ScalarMult and ScalarBaseMult methods of the P256 Curve may return an incorrect result if called with some specific unreduced scalars, such as a scalar larger than the order of the curve. This does not impact usages of crypto/ecdsa or crypto/ecdh.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-24532"
},
{
"category": "external",
"summary": "RHBZ#2223355",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223355"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-24532"
},
{
"category": "external",
"summary": "https://go.dev/cl/471255",
"url": "https://go.dev/cl/471255"
},
{
"category": "external",
"summary": "https://go.dev/issue/58647",
"url": "https://go.dev/issue/58647"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY",
"url": "https://groups.google.com/g/golang-announce/c/3-TpUx48iQY"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1621",
"url": "https://pkg.go.dev/vuln/GO-2023-1621"
}
],
"release_date": "2023-03-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/internal/nistec: specific unreduced P-256 scalars produce incorrect results"
},
{
"cve": "CVE-2023-26159",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2024-01-02T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2256413"
}
],
"notes": [
{
"category": "description",
"text": "An Improper Input Validation flaw was found in follow-redirects due to the improper handling of URLs by the url.parse() function. When a new URL() throws an error, it can be manipulated to misinterpret the hostname. This issue could allow an attacker to redirect traffic to a malicious site, potentially leading to information disclosure, phishing attacks, or other security breaches.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "follow-redirects is a transitive dependency of Grafana, and does not affect Red Hat Enterprise Linux 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26159"
},
{
"category": "external",
"summary": "RHBZ#2256413",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256413"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26159"
}
],
"release_date": "2024-01-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "follow-redirects: Improper Input Validation due to the improper handling of URLs by the url.parse()"
},
{
"cve": "CVE-2023-27043",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2023-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2196183"
}
],
"notes": [
{
"category": "description",
"text": "The email module of Python through 3.11.3 incorrectly parses e-mail addresses that contain a special character. The wrong portion of an RFC2822 header is identified as the value of the addr-spec. In some applications, an attacker can bypass a protection mechanism in which application access is granted only after verifying receipt of e-mail to a specific domain (e.g., only @company.example.com addresses may be used for signup). This occurs in email/_parseaddr.py in recent versions of Python.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-27043"
},
{
"category": "external",
"summary": "RHBZ#2196183",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2196183"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27043",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27043"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/7051467",
"url": "https://access.redhat.com/articles/7051467"
}
],
"release_date": "2023-04-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python: Parsing errors in email/_parseaddr.py lead to incorrect value in email address part of tuple"
},
{
"cve": "CVE-2023-28486",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2023-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2179272"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where sudo improperly escapes terminal control characters during logging operations. As sudo\u0027s log messages may contain user-controlled strings, this may allow an attacker to inject terminal control commands, leading to a leak of restricted information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Sudo does not escape control characters in log messages",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28486"
},
{
"category": "external",
"summary": "RHBZ#2179272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28486",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28486"
}
],
"release_date": "2023-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sudo: Sudo does not escape control characters in log messages"
},
{
"cve": "CVE-2023-28487",
"cwe": {
"id": "CWE-117",
"name": "Improper Output Neutralization for Logs"
},
"discovery_date": "2023-03-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2179273"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sudo package, shipped with Red Hat Enterprise Linux 8 and 9, where the \"sudoreplay -l\u0027 command improperly escapes terminal control characters. As sudo\u0027s log messages may contain user-controlled strings, this could allow an attacker to inject terminal control commands, leading to a leak of restricted information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Sudo does not escape control characters in sudoreplay output",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28487"
},
{
"category": "external",
"summary": "RHBZ#2179273",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2179273"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28487",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28487"
}
],
"release_date": "2023-03-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sudo: Sudo does not escape control characters in sudoreplay output"
},
{
"cve": "CVE-2023-29406",
"cwe": {
"id": "CWE-113",
"name": "Improper Neutralization of CRLF Sequences in HTTP Headers (\u0027HTTP Request/Response Splitting\u0027)"
},
"discovery_date": "2023-07-12T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2222167"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang, where it is vulnerable to HTTP header injection caused by improper content validation of the Host header by the HTTP/1 client. A remote attacker can inject arbitrary HTTP headers by persuading a victim to visit a specially crafted Web page. This flaw allows the attacker to conduct various attacks against the vulnerable system, including Cross-site scripting, cache poisoning, or session hijacking.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http: insufficient sanitization of Host header",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29406"
},
{
"category": "external",
"summary": "RHBZ#2222167",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2222167"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29406"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0",
"url": "https://groups.google.com/g/golang-announce/c/2q13H6LEEx0"
}
],
"release_date": "2023-07-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http: insufficient sanitization of Host header"
},
{
"cve": "CVE-2023-29409",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-08-03T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "RHBZ#2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
},
{
"category": "external",
"summary": "https://go.dev/cl/515257",
"url": "https://go.dev/cl/515257"
},
{
"category": "external",
"summary": "https://go.dev/issue/61460",
"url": "https://go.dev/issue/61460"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1987",
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw has been marked as moderate instead of high like NVD \nQUICConn.HandleData buffers data and passes it to handlePostHandshakeMessage every time the buffer contains a complete message, while HandleData doesn\u0027t limit the amount of data it can buffer, a panic or denial of service would likely be lower severity,also in order to exploit this vulnerability, an attacker would have to smuggle partial handshake data which might be rejected altogether as per tls RFC specification.Therfore because of a lower severity denial of service and conditions that are beyond the scope of attackers control,we have marked this as moderate severity",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A vulnerability was found in the Go QUIC protocol implementation in the logic that processes post-handshake messages. It is an uncontrolled resource consumption flaw, triggered when a malicious connection sends data without an enforced upper bound. This leads to unbounded memory growth, causing the service to crash and resulting in a denial of service.The single-dimensional impact of denial of service and the added complexity of whether the resource exhaustion would happen, being out of an attacker\u0027s control,this has been rated as moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39615",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-08-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2235864"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Libxml2, where it contains a global buffer overflow via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a denial of service (DoS) by supplying a crafted XML file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: crafted xml can cause global buffer overflow",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39615"
},
{
"category": "external",
"summary": "RHBZ#2235864",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2235864"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39615",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39615"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/535",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/535"
}
],
"release_date": "2023-08-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: crafted xml can cause global buffer overflow"
},
{
"cve": "CVE-2023-42282",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"discovery_date": "2024-02-20T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2265161"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the NPM IP Package. This flaw allows an attacker to perform arbitrary code execution and obtain sensitive information via the isPublic() function by inducing a Server-Side Request Forgery (SSRF) attack and obtaining access to normally inaccessible resources.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nodejs-ip: arbitrary code execution via the isPublic() function",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "It appears that npm does not utilize the bundled code therefore Red Hat Enterprise Linux is not affected by this vulnerability.\n\nWhile the vulnerability in the NPM IP Package presents a significant security concern, it\u0027s categorized as important rather than critical due to several factors. Firstly, the misclassification of the private IP address 0x7f.1 as public by the isPublic() function does not directly lead to remote code execution or unauthorized access to critical systems. Instead, it facilitates SSRF attacks, which typically require additional conditions to fully exploit, such as the ability to influence server-side requests and responses. Additionally, the impact of SSRF attacks can vary depending on the specific environment and configuration of the affected system. While SSRF attacks can potentially lead to data exposure, service disruption, or lateral movement within a network, their severity is often mitigated by factors such as network segmentation, access controls, and the availability of sensitive resources.\n\nRed Hat Developer Hub contains a fix in 1.1-91 version.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42282"
},
{
"category": "external",
"summary": "RHBZ#2265161",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265161"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42282",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42282"
},
{
"category": "external",
"summary": "https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html",
"url": "https://cosmosofcyberspace.github.io/npm_ip_cve/npm_ip_cve.html"
}
],
"release_date": "2024-02-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nodejs-ip: arbitrary code execution via the isPublic() function"
},
{
"cve": "CVE-2023-42465",
"cwe": {
"id": "CWE-1319",
"name": "Improper Protection against Electromagnetic Fault Injection (EM-FI)"
},
"discovery_date": "2023-12-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2255568"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the sudo package. This issue could allow a local authenticated attacker to cause a bit to flip, which enables fault injection and may authenticate as the root user.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sudo: Targeted Corruption of Register and Stack Variables",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "\"Mayhem\" is a potent attack technique that focuses on the core components of computing systems, specifically the CPU internals and stack variables. This method signifies a noteworthy advancement in cyber threats, demonstrating a successful ability to tamper with a computer\u0027s memory and compromise both stack and register variables. Capitalizing on the well-known Rowhammer effect, wherein swift access to a DRAM row induces bit flips in neighboring rows, this clever attack exploits these bit flips to disrupt stack variables and manipulate register values within a given process. The manipulation is accomplished by targeting register values stored in the process\u0027s stack, which, once flushed out to memory, become vulnerable to Rowhammer attacks. When reloaded, these corrupted values cause chaos, compromising the integrity of the entire process. It\u0027s important to note that this attack is confined to the local system, leading us to categorize it as a moderate threat.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-42465"
},
{
"category": "external",
"summary": "RHBZ#2255568",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255568"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42465",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42465"
},
{
"category": "external",
"summary": "https://arxiv.org/pdf/2309.02545.pdf",
"url": "https://arxiv.org/pdf/2309.02545.pdf"
},
{
"category": "external",
"summary": "https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f",
"url": "https://github.com/sudo-project/sudo/commit/7873f8334c8d31031f8cfa83bd97ac6029309e4f"
}
],
"release_date": "2023-09-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "In general to address this issue, it\u0027s crucial to implement robust logic that prevents unintended execution from a single-bit flip. \n\nBut mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "sudo: Targeted Corruption of Register and Stack Variables"
},
{
"cve": "CVE-2023-43646",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-09-28T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2241149"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the get-func-name package in the chai module. Affected versions of this package are vulnerable to Regular expression denial of service (ReDoS) attacks, affecting system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "get-func-name: ReDoS in chai module",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "- This vulnerability can be exploited when there is an imbalance in parentheses, which results in excessive backtracking and subsequently increases the CPU load and processing time significantly. This vulnerability can be triggered using the following input: \u0027\\t\u0027.repeat(54773) + \u0027\\t/function/i\u0027\n\n- The get-func-name package is a build-time dependency in Red Hat products, which reduces the chance of successful exploitation. Hence, the impact is set to Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43646"
},
{
"category": "external",
"summary": "RHBZ#2241149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43646"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43646",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43646"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-4q6p-r6v2-jvc5",
"url": "https://github.com/advisories/GHSA-4q6p-r6v2-jvc5"
},
{
"category": "external",
"summary": "https://github.com/chaijs/get-func-name/blob/78ad756441a83f3dc203e50f76c113ae3ac017dc/index.js#L15",
"url": "https://github.com/chaijs/get-func-name/blob/78ad756441a83f3dc203e50f76c113ae3ac017dc/index.js#L15"
}
],
"release_date": "2023-09-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "get-func-name: ReDoS in chai module"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
},
{
"acknowledgments": [
{
"names": [
"Harry Sintonen"
],
"organization": "reported"
},
{
"names": [
"Daniel Stenberg"
],
"organization": "patched"
}
],
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"discovery_date": "2023-11-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2252030"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in curl that verifies a given cookie domain against the Public Suffix List. This issue could allow a malicious HTTP server to set \"super cookies\" in curl that are passed back to more origins than what is otherwise allowed or possible.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "curl: information disclosure by exploiting a mixed case flaw",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "When curl is built without PSL support, it cannot protect against this problem but it is expected to not allow \"too wide\" cookies when PSL support is enabled.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46218"
},
{
"category": "external",
"summary": "RHBZ#2252030",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2252030"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46218",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46218"
},
{
"category": "external",
"summary": "https://curl.se/docs/CVE-2023-46218.html",
"url": "https://curl.se/docs/CVE-2023-46218.html"
}
],
"release_date": "2023-12-06T07:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "curl: information disclosure by exploiting a mixed case flaw"
},
{
"cve": "CVE-2023-48631",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"discovery_date": "2023-12-14T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254559"
}
],
"notes": [
{
"category": "description",
"text": "A Regular Expression Denial of Service (ReDoS) vulnerability was found in Adobe\u0027s css-tools when parsing CSS. This issue occurs due to improper input validation and may allow an attacker to use a carefully crafted input string to cause a denial of service, especially when attempting to parse CSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "css-tools: regular expression denial of service (ReDoS) when parsing CSS",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Regular Expression Denial of Service (ReDoS) vulnerability in css-tools, triggered by improper input validation when parsing CSS, is considered of moderate severity. While it can lead to a denial of service by causing the application to become unresponsive, the impact is limited to scenarios where an attacker can provide crafted input. Additionally, the absence of evidence of active exploitation in the wild and contextual factors, such as the software\u0027s usage, contribute to the moderate severity rating.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
],
"known_not_affected": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-48631"
},
{
"category": "external",
"summary": "RHBZ#2254559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254559"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-48631",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48631"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48631"
},
{
"category": "external",
"summary": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2",
"url": "https://github.com/adobe/css-tools/security/advisories/GHSA-prr3-c3m5-p7q2"
}
],
"release_date": "2023-12-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "css-tools: regular expression denial of service (ReDoS) when parsing CSS"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"discovery_date": "2023-12-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254210"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ssh: Prefix truncation attack on Binary Packet Protocol (BPP)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is classified as moderate because the attack requires an active Man-in-the-Middle (MITM) who can intercept and modify the connection\u0027s traffic at the TCP/IP layer.\n\nAlthough the attack is cryptographically innovative, its security impact is fortunately quite limited. It only allows the deletion of consecutive messages, and deleting most messages at this protocol stage prevents user authentication from proceeding, leading to a stalled connection.\n\nThe most significant identified impact is that it enables a MITM to delete the SSH2_MSG_EXT_INFO message sent before authentication begins. This allows the attacker to disable a subset of keystroke timing obfuscation features. However, there is no other observable impact on session secrecy or session integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-48795"
},
{
"category": "external",
"summary": "RHBZ#2254210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/7071748",
"url": "https://access.redhat.com/solutions/7071748"
},
{
"category": "external",
"summary": "https://terrapin-attack.com/",
"url": "https://terrapin-attack.com/"
}
],
"release_date": "2023-12-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Update to the last version and check that client and server provide kex pseudo-algorithms indicating usage of the updated version of the protocol which is protected from the attack. If \"kex-strict-c-v00@openssh.com\" is provided by clients and \"kex-strict-s-v00@openssh.com\" is in the server\u0027s reply, no other steps are necessary.\n\nDisabling ciphers if necessary:\n\nIf \"kex-strict-c-v00@openssh.com\" is not provided by clients or \"kex-strict-s-v00@openssh.com\" is absent in the server\u0027s reply, you can disable the following ciphers and HMACs as a workaround on RHEL-8 and RHEL-9:\n\n1. chacha20-poly1305@openssh.com\n2. hmac-sha2-512-etm@openssh.com\n3. hmac-sha2-256-etm@openssh.com\n4. hmac-sha1-etm@openssh.com\n5. hmac-md5-etm@openssh.com\n\nTo do that through crypto-policies, one can apply a subpolicy with the following content:\n```\ncipher@SSH = -CHACHA20-POLY1305\nssh_etm = 0\n```\ne.g., by putting these lines into `/etc/crypto-policies/policies/modules/CVE-2023-48795.pmod`, applying the resulting subpolicy with `update-crypto-policies --set $(update-crypto-policies --show):CVE-2023-48795` and restarting openssh server.\n\nOne can verify that the changes are in effect by ensuring the ciphers listed above are missing from both `/etc/crypto-policies/back-ends/openssh.config` and `/etc/crypto-policies/back-ends/opensshserver.config`.\n\nFor more details on using crypto-policies, please refer to https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening\n\nNote that this procedure does limit the interoperability of the host and is only suggested as a temporary mitigation until the issue is fully resolved with an update.\n\nFor RHEL-7: \nWe can recommend to use strict MACs and Ciphers on RHEL7 in both files /etc/ssh/ssh_config and /etc/ssh/sshd_config.\n\nBelow strict set of Ciphers and MACs can be used as mitigation for RHEL 7.\n\n```\nCiphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com\nMACs umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512\n```\n\n- For Openshift Container Platform 4:\nPlease refer the KCS[1] document for verifying the fix in RHCOS.\n\n[1] https://access.redhat.com/solutions/7071748",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ssh: Prefix truncation attack on Binary Packet Protocol (BPP)"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2023-12-18T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2255271"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in OpenSSH. In certain circumstances, a remote attacker may be able to execute arbitrary OS commands by using expansion tokens, such as %u or %h, with user names or host names that contain shell metacharacters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "openssh: potential command injection via shell metacharacters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The ability to execute OS commands is dependent on what quoting is present in the user-supplied ssh_config directive. However, it is generally the user\u0027s responsibility to validate arguments passed to SSH.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-51385"
},
{
"category": "external",
"summary": "RHBZ#2255271",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255271"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-51385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-51385"
}
],
"release_date": "2023-12-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "openssh: potential command injection via shell metacharacters"
},
{
"cve": "CVE-2024-0553",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2024-01-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258412"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: incomplete fix for CVE-2023-5981",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified vulnerability in the GnuTLS library, designated as CVE-2024-0553, presents a moderate severity concern due to its potential for facilitating timing side-channel attacks in RSA-PSK ciphersuites. While the flaw allows for the exploitation of timing differentials during the key exchange process, enabling attackers to infer sensitive data, its impact is constrained by several factors. Firstly, successful exploitation requires precise timing measurements and sophisticated analysis techniques, posing a significant barrier to entry for potential attackers. Additionally, the effectiveness of the attack is contingent on environmental factors such as network latency and system load, further limiting its practical feasibility. \n\n This issue marked as an incomplete resolution for a previously identified vulnerability, CVE-2023-5981, indicating a potential persistence or recurrence of the problem.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0553"
},
{
"category": "external",
"summary": "RHBZ#2258412",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258412"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0553",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0553"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1522",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1522"
},
{
"category": "external",
"summary": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: incomplete fix for CVE-2023-5981"
},
{
"cve": "CVE-2024-0567",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2024-01-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2258544"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "gnutls: rejects certificate chain with distributed trust",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The issue is marked as moderate because it involves a vulnerability in GnuTLS, specifically affecting Cockpit, which utilizes GnuTLS. The vulnerability arises when a certificate chain with distributed trust is rejected during validation using cockpit-certificate-ensure. Although this flaw could potentially be exploited by an unauthenticated remote attacker to trigger a denial of service attack on the client, it\u0027s important to note that specific server configurations are required for client authentication requests.\n\nThis is a bug in the GnuTLS library, Cockpit does not copy this code, but uses the shared lib at runtime. Hence, patching gnutls is necessary and sufficient to address this, hance Cockpit is not affected by this issue.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-0567"
},
{
"category": "external",
"summary": "RHBZ#2258544",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2258544"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0567",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0567"
},
{
"category": "external",
"summary": "https://gitlab.com/gnutls/gnutls/-/issues/1521",
"url": "https://gitlab.com/gnutls/gnutls/-/issues/1521"
},
{
"category": "external",
"summary": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html",
"url": "https://lists.gnupg.org/pipermail/gnutls-help/2024-January/004841.html"
}
],
"release_date": "2024-01-16T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-03-19T15:19:34+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:5e262fe96badcdebcf0fc40e07acecd607b83a3d48fb90b05bc89ebe790add14_amd64",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:765e623f5b4de11f0482f3abde344df4946665046c9190293a0ae9a5d0d62cd2_s390x",
"9Base-RHODF-4.15:odf4/cephcsi-rhel9@sha256:b4b66a42eb728b46ff977431fd07be976d465680f49516dac3f433cdd12e4dbc_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:23becbe8a9d70cda09e2d10fdd3411b943368a3d92535798d595d29b5bbc4f7e_arm64",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:31d951727244d235e62aed00d1121c6f8da4b9d22e895dcfdc814a8545442dac_s390x",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:b0eece2979587d7884f8707a6026e28a4aa7a3d96646b01249a9e351acf6b935_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-core-rhel9@sha256:f98634a0fa2517efb383bf6c2a4809f150408225875d7425e64a339209d72e32_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:19c29de2cf31f95e5f363064095602656355879eb19c778a8655083cebd54ce6_amd64",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:3303677bc0ba2cc5e3f55ae313b516f32378b67a20389f69e09e2c3a9738a87d_s390x",
"9Base-RHODF-4.15:odf4/mcg-operator-bundle@sha256:98fb1b9309d82c663d3118d19fe776de51a277c474a42bf249fdf075f6993bc4_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:93ed7e87e7660991843f3b2114ff2abe74f3b509c2b9a0ee32fc8707051203af_amd64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:94f6dded2ff421275b26d147e35d33e383f06ecb04cd0a618d8b4c5046d0e307_ppc64le",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d04a5a9748ac34459c21d4d10efcc9318220c7ceeeb15c41c56cae9bfbb44872_arm64",
"9Base-RHODF-4.15:odf4/mcg-rhel9-operator@sha256:d312e5adf2261eeab1106a72565652637d42e2d49d2294cb1413be62697f18d2_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:1add011155a8f31010d52ab3a441a332272ca8bc0bbe93f21d126ed99b07218a_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:abe77b4860b2c3d88b081aa0bb69c996cb83bc288209aa805de626220cc0ad48_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-console-rhel9@sha256:f1b19a6b805ad0ae2bc7dc08f2e7992e9d440bfa858d5ac2667f9311a95d6e12_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:7fdae4274b87123284a7fb6cc7b56be3e22be629ff834d658a9afd867ef6473b_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:85b41f9c66184ccc262cb8e00d3fdeb9029ca5c39df5521afb44bac604039bbe_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-operator-bundle@sha256:b081d99f0507897a3217db22bca57a948bbefdf27e30fd0506275b1dd908c7f6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:54d229a2b193748da1f66de6ce0c405f591808dd35e26dd0304582d86ba4d708_arm64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:d027156f3a8a80a12cfe6bdf207a25a3b1e0e84db9a59853072fdc6ea3766e18_s390x",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:e40c768e57bc8fc19a4028d8474cc00529b05fea3e1fdc7bd793c0b49df4891b_amd64",
"9Base-RHODF-4.15:odf4/ocs-client-rhel9-operator@sha256:f3b2c47af82b837c2f51cf04d4b7fc973bb3774151d144354d12e9893eadbcef_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:378212f323bd7dcc080f31b2f75082ec28c3d6104240c6eb2763d6bd2fc94d8e_s390x",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:c89d0ad159bff3915c121a3b97a3dc207d69cab48a25c73e27b53f2aacc6ebf7_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-metrics-exporter-rhel9@sha256:f437b8176480efc681950d885ce5a2816e3bc1a8bcb98b8d02fef7c201134c21_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:001f41ba066f39fc00818ec9982d5408415cc41cfa0c35e17a81310994e976a6_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:72c56580bab623f3e19418c52a6cc2e062c1f799e30609a4d4e292f525d01ec2_amd64",
"9Base-RHODF-4.15:odf4/ocs-operator-bundle@sha256:e63f59d7d4aeff45ffe3e5d622b0526f568f39b559f21fa87f08a69e1a8452ac_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:2ee595d52185127dbcef534dee457e9bdb2e72c7292fdafaec8f730e00762ef9_ppc64le",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:4ce02a91070158e2b0e199d6949b66daa9ecdb716dddcbc586c368cd5180dd16_s390x",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:b94cc2b0df9566a19418cd9445018c7974bdeb501b9bc26d374f8ecc400ff725_amd64",
"9Base-RHODF-4.15:odf4/ocs-rhel9-operator@sha256:f0eed493b993b35b41819c28e10218d5e3cae8da5a4fc6050a845c24b440b198_arm64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:5f9fc660dfa8507f01495558580e75612e3468fea4222f1a2fd9aac88533cdde_amd64",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:8bcf56bad8bfa401441828b8f2c77a88697f83103360f76f534abaabc7b4ed1f_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:bb23cf0882f1174a311a05c59646cb1cf30d4a74a297c854c19a26152d47ab47_s390x",
"9Base-RHODF-4.15:odf4/odf-cli-rhel9@sha256:d6ad83e3d8739bc004c3f634674badca5bfb284ef78b336f2e68509687bda0a2_arm64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:7dcf6b7101b8ebc902b7582dc2038f261b0d7f4783f0ac6ac8d97c60126801b2_s390x",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9a90552dd4d8921f3ef1f2a090140ec0d2de3ee41d1b7a6d9963104689618153_amd64",
"9Base-RHODF-4.15:odf4/odf-console-rhel9@sha256:9e12f5478515f1641afb3a4dde983671270afeed59a6372a30c74b3b7a5936a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:c7c5f4cbee26d0ef67fcf9294d3773e2e37308ae56da865cc0ad356ed8f5e206_s390x",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:d984ee4c271840b18c3b2624e24db18a7be822950d00eab744a7ccd88998c539_amd64",
"9Base-RHODF-4.15:odf4/odf-cosi-sidecar-rhel9@sha256:dbf68ee98865ddf8ace7a8f626c7c588f35724bc565ce10ffe23d4c76bf2c7e5_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:04ccc74bd95015ac4cfa72deca9fdc1b21b968e61640c525ad6e2ae5ce138cb1_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:3738a473f48376f6debe80dfed9d4decbfffd0a4ea04f59a9d20b7b6b7039830_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-operator-bundle@sha256:cc9a1591a6dde4b82a87915589458a5741566e29cc80e16f2d96bd5bafc85bbe_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:32f3f0dbf489a6db8f56235780e2dd119c6295b8fa4d5216418daa17203e38c8_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:3efe898c6142154200e47f4615acf03b0ce6c30ead6470307a782a9a2578cf53_ppc64le",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:b5ca5ce01ba5ac651a1442498c18b2620bd290d64e902f94810162e172d749ba_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-rhel9-operator@sha256:fe0cbb229b959a9fe2f47c08fbe6239a275bd30e6dc00e81e6f5f97ef8211a38_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:033f3718e8a073dc2ebc871a2c623ff684a2a9d73c46f9d300a0ca0426c1233b_amd64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:2e339236492b5bf2e881b8e88c40f54b4b0b9dddbe442363b2efb92dfd720d29_s390x",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:7c900a434cff47dae8662ff00e64542b591eb388e5aecdc9fe3746542f278f9c_arm64",
"9Base-RHODF-4.15:odf4/odf-csi-addons-sidecar-rhel9@sha256:ca132fd7b3c36d14ba87259812a92f219bc4cceb12ba30a119062b95f86963e9_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:7fcb03d69dbceff7968a78ee658c6c8318253f59262d5e3e8c898a5b45316067_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:b088bec0345723d1a1916f77908adff41574b1327428576503d15390cd26430f_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-console-rhel9@sha256:f294e16791a917b48c09d075f327e97b17cf5307356a3626da618a13952c8cfb_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:a49eef2a4eaf6751f2e2addfaecdcf2e8c44d989e5bb617747d12dbee56cc862_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:b2c64034cfa1ed2865a2f53ee075063a9b2e9c9dc288f09eec1b0e7df4e7b4ef_s390x",
"9Base-RHODF-4.15:odf4/odf-multicluster-operator-bundle@sha256:e8ff736bac5d26c34a47f72b019597b71eba1235d382b0879f21f38e366d669d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:078b72a6719351177b317ecdc257534c78fbc7ab23e0918392aea48767cbe9eb_amd64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:21f83cb5ff06ee334b44f85fe0f6dbb2e18216f27a493c56a35e319512887697_arm64",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:369d1d12a4f8d7fe23f33553e2aa7f5491e1233b988c11b71ed8f2d9d512ad1c_ppc64le",
"9Base-RHODF-4.15:odf4/odf-multicluster-rhel9-operator@sha256:d09dcf83c8efd61a8409c6677c284705a9e53a42931d2afc432e1676d308dbfe_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:1a5797806a22bd7e683138c043a45f6d59b19d6ef5d92a07cf47226991512520_s390x",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:7e8c6afa59ea01c3f827852bcbde72e129713f19bd0c3528d2b42818eedfbc5d_amd64",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ad4964e6ff46b37a4903b3cc13b216e29d07b4864b607a12db755b45884db656_ppc64le",
"9Base-RHODF-4.15:odf4/odf-must-gather-rhel9@sha256:ffca15ba53f5ba61368883cb03b21e4a3c071fc8f5565ed106e2599f55cdd402_arm64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:2df80b908fc7dfd07dae58d641d9ab412f345114bed59cdd59e7c2b9f274b1a3_ppc64le",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:3d7ea702b7c914d1708d3e01570a9d9a49880ad94f8dbe13f852d377e2de5448_amd64",
"9Base-RHODF-4.15:odf4/odf-operator-bundle@sha256:5254d6581a1e5c7bbdf2621448d812be6ae5a1931009a3f9aa1046176841f68b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:3776c9d3070eef0f138f92c1d795c5070fd36da9f253d5c40b06f2eda733415b_s390x",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:4044d62c852f88417de640f4d1c0fdf9e37d9b1c61de54ea379d321d9e04d05d_ppc64le",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:418e629e0aaf849c95257c6bcf23b3d51e87c5de7c008e7f53cd3acaa1295461_arm64",
"9Base-RHODF-4.15:odf4/odf-rhel9-operator@sha256:bfbc74cba2f0cf0daf18ff1064b72b975ec6f1d83342837673da6b2fc0cc9473_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:3744ce0820bfe62afe92f3d54dfe14e84855e31c74742e625076cb4c64a6f098_amd64",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:d9651310304b6f822609b3b4f3268582cf1d218d2ad0f123e3b09a095c78a1fd_s390x",
"9Base-RHODF-4.15:odf4/odr-cluster-operator-bundle@sha256:ebb47486174b4437bf8ccee7b642fa499e054e204d7c4cabc7f249beda3d0675_ppc64le",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:287d69fe191022e7681a5d6067128f72323cdcbc710f82e88e2cdd3d29410f9e_amd64",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:2e95ebb9976f65c2cbc4c9f96d3b262dab13aac1fb7740a1f4962d54e8a88470_s390x",
"9Base-RHODF-4.15:odf4/odr-hub-operator-bundle@sha256:95a9dfb1583482c881ded3de02d84776e3392a3d449146affaee05a289d97d45_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:1a9ee6e62764e9331fda9d9b947e011f7bc15c68edeef730780fe4b43e399a08_s390x",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:78368eb70e39f1977c0efaeff99a13f22dce181d2e8ec1dfb39fa6575c7bd6ef_ppc64le",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:b291ff5f30c8d2771315c2531e48c5484915d3ec5c3e7ca0d29157445f181b60_amd64",
"9Base-RHODF-4.15:odf4/odr-rhel9-operator@sha256:c10016cc04ebf7d944e6dbab8c15f7a60f277cb19487cf47cb8438d7060694f9_arm64",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:7066ce8a9b54bd3065d1b5a839350e7e7e57538a475873ea840435c111357e91_ppc64le",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:9e0986c18a9642b411e27b3f460c74f089ae4c15b94332999f84bfe690616ff0_s390x",
"9Base-RHODF-4.15:odf4/rook-ceph-rhel9-operator@sha256:a1f86e792657000ce9ba0faf3ee6ade5e11724146ab86b0b67e50cdab233fd4a_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "gnutls: rejects certificate chain with distributed trust"
}
]
}
RHSA-2024:2734
Vulnerability from csaf_redhat - Published: 2024-05-22 20:37 - Updated: 2026-04-01 19:04A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat OpenStack\nPlatform 17.1 (Wallaby).\n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* Request body not stripped after redirect from 303 status changes request\nmethod to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2734",
"url": "https://access.redhat.com/errata/RHSA-2024:2734"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2734.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenStack Platform 17.1 (python-urllib3) security update",
"tracking": {
"current_release_date": "2026-04-01T19:04:20+00:00",
"generator": {
"date": "2026-04-01T19:04:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:2734",
"initial_release_date": "2024-05-22T20:37:47+00:00",
"revision_history": [
{
"date": "2024-05-22T20:37:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T20:37:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:04:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 17.1",
"product": {
"name": "Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-17.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:17.1::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 17.1",
"product": {
"name": "Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-DEPLOYMENT-TOOLS-17.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:17.1::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat OpenStack Platform 17.1",
"product": {
"name": "Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-TOOLS-17.1",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:17.1::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenStack Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.25.10-6.el8ost.src",
"product": {
"name": "python-urllib3-0:1.25.10-6.el8ost.src",
"product_id": "python-urllib3-0:1.25.10-6.el8ost.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.25.10-6.el8ost?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.25.10-6.el8ost.noarch",
"product": {
"name": "python3-urllib3-0:1.25.10-6.el8ost.noarch",
"product_id": "python3-urllib3-0:1.25.10-6.el8ost.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.25.10-6.el8ost?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-6.el8ost.src as a component of Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-17.1:python-urllib3-0:1.25.10-6.el8ost.src"
},
"product_reference": "python-urllib3-0:1.25.10-6.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-17.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.25.10-6.el8ost.noarch as a component of Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch"
},
"product_reference": "python3-urllib3-0:1.25.10-6.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOS-17.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-6.el8ost.src as a component of Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src"
},
"product_reference": "python-urllib3-0:1.25.10-6.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-DEPLOYMENT-TOOLS-17.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.25.10-6.el8ost.noarch as a component of Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch"
},
"product_reference": "python3-urllib3-0:1.25.10-6.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOS-DEPLOYMENT-TOOLS-17.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.25.10-6.el8ost.src as a component of Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src"
},
"product_reference": "python-urllib3-0:1.25.10-6.el8ost.src",
"relates_to_product_reference": "8Base-RHOS-TOOLS-17.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.25.10-6.el8ost.noarch as a component of Red Hat OpenStack Platform 17.1",
"product_id": "8Base-RHOS-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch"
},
"product_reference": "python3-urllib3-0:1.25.10-6.el8ost.noarch",
"relates_to_product_reference": "8Base-RHOS-TOOLS-17.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T20:37:47+00:00",
"details": "For details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-RHOS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2734"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"8Base-RHOS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-DEPLOYMENT-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch",
"8Base-RHOS-TOOLS-17.1:python-urllib3-0:1.25.10-6.el8ost.src",
"8Base-RHOS-TOOLS-17.1:python3-urllib3-0:1.25.10-6.el8ost.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2025:1793
Vulnerability from csaf_redhat - Published: 2025-02-25 11:31 - Updated: 2026-04-01 19:06A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:1793",
"url": "https://access.redhat.com/errata/RHSA-2025:1793"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_1793.json"
}
],
"title": "Red Hat Security Advisory: python3.11-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:06:42+00:00",
"generator": {
"date": "2026-04-01T19:06:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2025:1793",
"initial_release_date": "2025-02-25T11:31:57+00:00",
"revision_history": [
{
"date": "2025-02-25T11:31:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-02-25T11:31:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:06:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9_4.2.src",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_4.2.src",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9_4.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9_4.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"product": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"product_id": "python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-2.el9_4.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-2.el9_4.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.src"
},
"product_reference": "python3.11-urllib3-0:1.26.12-2.el9_4.2.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-02-25T11:31:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:1793"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.noarch",
"AppStream-9.4.0.Z.EUS:python3.11-urllib3-0:1.26.12-2.el9_4.2.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:0300
Vulnerability from csaf_redhat - Published: 2024-01-18 16:31 - Updated: 2026-04-01 19:03A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0300",
"url": "https://access.redhat.com/errata/RHSA-2024:0300"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0300.json"
}
],
"title": "Red Hat Security Advisory: python-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:03:15+00:00",
"generator": {
"date": "2026-04-01T19:03:15+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:0300",
"initial_release_date": "2024-01-18T16:31:24+00:00",
"revision_history": [
{
"date": "2024-01-18T16:31:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-18T16:31:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:03:15+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"product": {
"name": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"product_id": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.24.2-5.el8_6.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"product": {
"name": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"product_id": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.24.2-5.el8_6.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.24.2-5.el8_6.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src"
},
"product_reference": "python-urllib3-0:1.24.2-5.el8_6.1.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
},
"product_reference": "python3-urllib3-0:1.24.2-5.el8_6.1.noarch",
"relates_to_product_reference": "BaseOS-8.6.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-18T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0300"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-18T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0300"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.6.0.Z.EUS:python-urllib3-0:1.24.2-5.el8_6.1.src",
"BaseOS-8.6.0.Z.EUS:python3-urllib3-0:1.24.2-5.el8_6.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:2988
Vulnerability from csaf_redhat - Published: 2024-05-22 09:48 - Updated: 2026-04-11 19:43A flaw was found in the urllib3 package. Affected versions of this package are vulnerable to information exposure through sent data when the authorization HTTP header is not removed during a cross-origin redirect. An attacker can expose credentials in the authorization header to unintended hosts or transmit them in clear text by exploiting the incomplete fix for CVE-2018-20060.
A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.
A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate's private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0–1.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.
A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.
A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request's form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.
A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.
A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.
A flaw was found in Golang. The html/template package did not properly handle HMTL-like "<!--" and "-->" comment tokens, nor hashbang "#!" comment tokens, in <script> contexts. This issue may cause the template parser to improperly interpret the contents of <script> contexts, causing actions to be improperly escaped.
A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of "<script", "<!--", and "</script" within JS literals in <script> contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.
A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.
A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.
A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).
A flaw was found in the Golang crypto/tls standard library. In previous versions, the package was vulnerable to a Timing Side Channel attack by observing the time it took for RSA-based TLS key exchanges, which was not constant. This flaw allows a malicious user to gather information from the environment.
A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.
A vulnerability was found in the Moby Builder Toolkit. A malicious BuildKit client or any frontend that can craft a request could lead to the BuildKit daemon crashing with a panic due to the lack of input validation. A frontend is usually specified as the #syntax line on a Dockerfile or with the --frontend flag when using the buildctl build command.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The container-tools module contains tools for working with containers, notably podman, buildah, skopeo, and runc.\n\nSecurity Fix(es):\n\n* urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect (CVE-2018-25091)\n\n* golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents (CVE-2021-33198)\n\n* golang: crypto/tls: certificate of wrong type is causing TLS client to panic (CVE-2021-34558)\n\n* golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)\n\n* golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)\n\n* golang: crypto/tls: slow verification of certificate chains containing large RSA keys (CVE-2023-29409)\n\n* golang: html/template: improper handling of HTML-like comments within script contexts (CVE-2023-39318)\n\n* golang: html/template: improper handling of special tags within script contexts (CVE-2023-39319)\n\n* golang: crypto/tls: panic when processing post-handshake message on QUIC connections (CVE-2023-39321)\n\n* golang: crypto/tls: lack of a limit on buffered post-handshake (CVE-2023-39322)\n\n* golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests (CVE-2023-39326)\n\n* golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges. (CVE-2023-45287)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\n* ssh: Prefix truncation attack on Binary Packet Protocol (BPP) (CVE-2023-48795)\n\n* moby/buildkit: Possible race condition with accessing subpaths from cache mounts (CVE-2024-23650)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2988",
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
},
{
"category": "external",
"summary": "1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "2244340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244340"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "2254210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
},
{
"category": "external",
"summary": "2262272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262272"
},
{
"category": "external",
"summary": "RHEL-18150",
"url": "https://issues.redhat.com/browse/RHEL-18150"
},
{
"category": "external",
"summary": "RHEL-2598",
"url": "https://issues.redhat.com/browse/RHEL-2598"
},
{
"category": "external",
"summary": "RHEL-26594",
"url": "https://issues.redhat.com/browse/RHEL-26594"
},
{
"category": "external",
"summary": "RHEL-3088",
"url": "https://issues.redhat.com/browse/RHEL-3088"
},
{
"category": "external",
"summary": "RHEL-3093",
"url": "https://issues.redhat.com/browse/RHEL-3093"
},
{
"category": "external",
"summary": "RHEL-3146",
"url": "https://issues.redhat.com/browse/RHEL-3146"
},
{
"category": "external",
"summary": "RHEL-9836",
"url": "https://issues.redhat.com/browse/RHEL-9836"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2988.json"
}
],
"title": "Red Hat Security Advisory: container-tools:rhel8 security update",
"tracking": {
"current_release_date": "2026-04-11T19:43:50+00:00",
"generator": {
"date": "2026-04-11T19:43:50+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.5"
}
},
"id": "RHSA-2024:2988",
"initial_release_date": "2024-05-22T09:48:55+00:00",
"revision_history": [
{
"date": "2024-05-22T09:48:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T09:48:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-11T19:43:50+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"product": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src (container-tools:rhel8)",
"product_id": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.10.0-1.module%2Bel8.10.0%2B21209%2B52deeb51?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"product": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src (container-tools:rhel8)",
"product_id": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"product": {
"name": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src (container-tools:rhel8)",
"product_id": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@84.1-1.module%2Bel8.10.0%2B21373%2B0d273fdf?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"product": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src (container-tools:rhel8)",
"product_id": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=src\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"product": {
"name": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src (container-tools:rhel8)",
"product_id": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-2.module%2Bel8.10.0%2B21196%2B3f0abbca?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"product": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src (container-tools:rhel8)",
"product_id": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-81.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"product": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.src (container-tools:rhel8)",
"product_id": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"product": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src (container-tools:rhel8)",
"product_id": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src (container-tools:rhel8)",
"product_id": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src (container-tools:rhel8)",
"product_id": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"product": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src (container-tools:rhel8)",
"product_id": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.10.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"product": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src (container-tools:rhel8)",
"product_id": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=src\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"product": {
"name": "python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src (container-tools:rhel8)",
"product_id": "python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-podman@4.9.0-1.module%2Bel8.10.0%2B21196%2B3f0abbca?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"product": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src (container-tools:rhel8)",
"product_id": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=src\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"product": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src (container-tools:rhel8)",
"product_id": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=src\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"product": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src (container-tools:rhel8)",
"product_id": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"product": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src (container-tools:rhel8)",
"product_id": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"product": {
"name": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src (container-tools:rhel8)",
"product_id": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.9.0%2B20326%2B387084d0?arch=src\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"product": {
"name": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch (container-tools:rhel8)",
"product_id": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/cockpit-podman@84.1-1.module%2Bel8.10.0%2B21373%2B0d273fdf?arch=noarch\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"product": {
"name": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch (container-tools:rhel8)",
"product_id": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/container-selinux@2.229.0-2.module%2Bel8.10.0%2B21196%2B3f0abbca?arch=noarch\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"product": {
"name": "podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch (container-tools:rhel8)",
"product_id": "podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-docker@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=noarch\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"product": {
"name": "python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch (container-tools:rhel8)",
"product_id": "python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-podman@4.9.0-1.module%2Bel8.10.0%2B21196%2B3f0abbca?arch=noarch\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"product": {
"name": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch (container-tools:rhel8)",
"product_id": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/udica@0.2.6-20.module%2Bel8.9.0%2B20326%2B387084d0?arch=noarch\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"product": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64 (container-tools:rhel8)",
"product_id": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.10.0-1.module%2Bel8.10.0%2B21209%2B52deeb51?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8)",
"product_id": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8)",
"product_id": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8)",
"product_id": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8)",
"product_id": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"product": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64 (container-tools:rhel8)",
"product_id": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64 (container-tools:rhel8)",
"product_id": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"product": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64 (container-tools:rhel8)",
"product_id": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64 (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64 (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64 (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8)",
"product_id": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-81.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8)",
"product_id": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8)",
"product_id": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8)",
"product_id": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64 (container-tools:rhel8)",
"product_id": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64 (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64 (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8)",
"product_id": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.10.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64 (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64 (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64 (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8)",
"product_id": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=aarch64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8)",
"product_id": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8)",
"product_id": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8)",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8)",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=aarch64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8)",
"product_id": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8)",
"product_id": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=aarch64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8)",
"product_id": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8)",
"product_id": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8)",
"product_id": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=aarch64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"product": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le (container-tools:rhel8)",
"product_id": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.10.0-1.module%2Bel8.10.0%2B21209%2B52deeb51?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8)",
"product_id": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8)",
"product_id": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8)",
"product_id": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8)",
"product_id": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"product": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le (container-tools:rhel8)",
"product_id": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le (container-tools:rhel8)",
"product_id": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"product": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le (container-tools:rhel8)",
"product_id": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8)",
"product_id": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-81.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8)",
"product_id": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8)",
"product_id": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8)",
"product_id": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le (container-tools:rhel8)",
"product_id": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8)",
"product_id": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.10.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8)",
"product_id": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=ppc64le\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8)",
"product_id": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8)",
"product_id": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8)",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8)",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=ppc64le\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8)",
"product_id": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8)",
"product_id": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=ppc64le\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8)",
"product_id": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8)",
"product_id": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8)",
"product_id": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=ppc64le\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"product": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x (container-tools:rhel8)",
"product_id": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.10.0-1.module%2Bel8.10.0%2B21209%2B52deeb51?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8)",
"product_id": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8)",
"product_id": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8)",
"product_id": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8)",
"product_id": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"product": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x (container-tools:rhel8)",
"product_id": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x (container-tools:rhel8)",
"product_id": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"product": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x (container-tools:rhel8)",
"product_id": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8)",
"product_id": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-81.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8)",
"product_id": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8)",
"product_id": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8)",
"product_id": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x (container-tools:rhel8)",
"product_id": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8)",
"product_id": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.10.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8)",
"product_id": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=s390x\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8)",
"product_id": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8)",
"product_id": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8)",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8)",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=s390x\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8)",
"product_id": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8)",
"product_id": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=s390x\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8)",
"product_id": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8)",
"product_id": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8)",
"product_id": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=s390x\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"product": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64 (container-tools:rhel8)",
"product_id": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/aardvark-dns@1.10.0-1.module%2Bel8.10.0%2B21209%2B52deeb51?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8)",
"product_id": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8)",
"product_id": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8)",
"product_id": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-debugsource@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8)",
"product_id": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8)",
"product_id": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/buildah-tests-debuginfo@1.33.6-2.module%2Bel8.10.0%2B21371%2B46937ece?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"product": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64 (container-tools:rhel8)",
"product_id": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"product": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64 (container-tools:rhel8)",
"product_id": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debuginfo@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"product": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64 (container-tools:rhel8)",
"product_id": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/conmon-debugsource@2.1.10-1.module%2Bel8.10.0%2B21077%2B98b84d8a?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64 (container-tools:rhel8)",
"product_id": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64 (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debuginfo@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"product": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64 (container-tools:rhel8)",
"product_id": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containernetworking-plugins-debugsource@1.4.0-2.module%2Bel8.10.0%2B21366%2Bf9cb49f8?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8)",
"product_id": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/containers-common@1-81.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crit@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-debugsource@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-devel@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/criu-libs-debuginfo@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8)",
"product_id": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8)",
"product_id": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debuginfo@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8)",
"product_id": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/crun-debugsource@1.14.3-2.module%2Bel8.10.0%2B21340%2Bc6c7475a?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64 (container-tools:rhel8)",
"product_id": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64 (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debuginfo@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"product": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64 (container-tools:rhel8)",
"product_id": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fuse-overlayfs-debugsource@1.13-1.module%2Bel8.10.0%2B20412%2B95ee28e2?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debuginfo@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-debugsource@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libslirp-devel@4.4.0-1.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8)",
"product_id": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/netavark@1.10.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64 (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64 (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debuginfo@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"product": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64 (container-tools:rhel8)",
"product_id": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/oci-seccomp-bpf-hook-debugsource@1.2.10-1.module%2Bel8.10.0%2B20565%2Ba40ba0e5?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-catatonit-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-debugsource@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-gvproxy-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-plugins-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-remote-debuginfo@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8)",
"product_id": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/podman-tests@4.9.4-0.1.module%2Bel8.10.0%2B21350%2Bea09fba1?arch=x86_64\u0026epoch=3\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8)",
"product_id": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-criu@3.18-4.module%2Bel8.9.0%2B20326%2B387084d0?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8)",
"product_id": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8)",
"product_id": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debuginfo@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8)",
"product_id": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/runc-debugsource@1.1.12-1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=x86_64\u0026epoch=1\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8)",
"product_id": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8)",
"product_id": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/skopeo-tests@1.14.3-0.1.module%2Bel8.10.0%2B21251%2B62b7388c?arch=x86_64\u0026epoch=2\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8)",
"product_id": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8)",
"product_id": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debuginfo@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8)",
"product_id": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slirp4netns-debugsource@1.2.3-1.module%2Bel8.10.0%2B21306%2B6be40ce7?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8)",
"product_id": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8)",
"product_id": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debuginfo@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8)",
"product_id": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-debugsource@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
},
{
"category": "product_version",
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8)",
"product_id": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/toolbox-tests@0.0.99.5-2.module%2Bel8.10.0%2B21341%2Bff0b5f89?arch=x86_64\u0026rpmmod=container-tools:rhel8:8100020240227110532:82888897"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8"
},
"product_reference": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8"
},
"product_reference": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8"
},
"product_reference": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8"
},
"product_reference": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8"
},
"product_reference": "aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8"
},
"product_reference": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8"
},
"product_reference": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8"
},
"product_reference": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8"
},
"product_reference": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8"
},
"product_reference": "buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8"
},
"product_reference": "buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8"
},
"product_reference": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8"
},
"product_reference": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8"
},
"product_reference": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8"
},
"product_reference": "buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8"
},
"product_reference": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8"
},
"product_reference": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8"
},
"product_reference": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8"
},
"product_reference": "buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8"
},
"product_reference": "buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8"
},
"product_reference": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8"
},
"product_reference": "cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8"
},
"product_reference": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8"
},
"product_reference": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8"
},
"product_reference": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8"
},
"product_reference": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8"
},
"product_reference": "conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8"
},
"product_reference": "conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8"
},
"product_reference": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8"
},
"product_reference": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8"
},
"product_reference": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8"
},
"product_reference": "conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8"
},
"product_reference": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8"
},
"product_reference": "container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8"
},
"product_reference": "containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8"
},
"product_reference": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8"
},
"product_reference": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8"
},
"product_reference": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8"
},
"product_reference": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8"
},
"product_reference": "containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
},
"product_reference": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8"
},
"product_reference": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8"
},
"product_reference": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8"
},
"product_reference": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8"
},
"product_reference": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8"
},
"product_reference": "crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8"
},
"product_reference": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8"
},
"product_reference": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8"
},
"product_reference": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8"
},
"product_reference": "crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8"
},
"product_reference": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8"
},
"product_reference": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8"
},
"product_reference": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8"
},
"product_reference": "crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8"
},
"product_reference": "fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8"
},
"product_reference": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8"
},
"product_reference": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8"
},
"product_reference": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8"
},
"product_reference": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8"
},
"product_reference": "netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8"
},
"product_reference": "oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8"
},
"product_reference": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8"
},
"product_reference": "podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8"
},
"product_reference": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8"
},
"product_reference": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8"
},
"product_reference": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8"
},
"product_reference": "podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8"
},
"product_reference": "python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8"
},
"product_reference": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8"
},
"product_reference": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8"
},
"product_reference": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8"
},
"product_reference": "python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8"
},
"product_reference": "python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8"
},
"product_reference": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8"
},
"product_reference": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8"
},
"product_reference": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8"
},
"product_reference": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8"
},
"product_reference": "runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8"
},
"product_reference": "runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8"
},
"product_reference": "runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8"
},
"product_reference": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8"
},
"product_reference": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8"
},
"product_reference": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8"
},
"product_reference": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8"
},
"product_reference": "skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8"
},
"product_reference": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8"
},
"product_reference": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8"
},
"product_reference": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8"
},
"product_reference": "skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8"
},
"product_reference": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8"
},
"product_reference": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8"
},
"product_reference": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8"
},
"product_reference": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8"
},
"product_reference": "slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8"
},
"product_reference": "slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8"
},
"product_reference": "slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8"
},
"product_reference": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8"
},
"product_reference": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8"
},
"product_reference": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8"
},
"product_reference": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8"
},
"product_reference": "toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8"
},
"product_reference": "toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8"
},
"product_reference": "toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8"
},
"product_reference": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8"
},
"product_reference": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8"
},
"product_reference": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64 (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8"
},
"product_reference": "toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8"
},
"product_reference": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src (container-tools:rhel8) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
},
"product_reference": "udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"relates_to_product_reference": "AppStream-8.10.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25091",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2244340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the urllib3 package. Affected versions of this package are vulnerable to information exposure through sent data when the authorization HTTP header is not removed during a cross-origin redirect. An attacker can expose credentials in the authorization header to unintended hosts or transmit them in clear text by exploiting the incomplete fix for CVE-2018-20060.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This is only exploitable if a redirect differs in host, port, or scheme. Due to the credential exposure in the authorization header, the confidentiality is highly impacted, but there is no proof that the integrity is affected in any way.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-25091"
},
{
"category": "external",
"summary": "RHBZ#2244340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2244340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-25091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-25091",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25091"
},
{
"category": "external",
"summary": "https://security.snyk.io/vuln/SNYK-PYTHON-URLLIB3-5969479",
"url": "https://security.snyk.io/vuln/SNYK-PYTHON-URLLIB3-5969479"
}
],
"release_date": "2023-10-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: urllib3 does not remove the authorization HTTP header when following a cross-origin redirect"
},
{
"cve": "CVE-2021-33198",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2021-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1989575"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Go, where it attempts to allocate excessive memory. This issue may cause panic or unrecoverable fatal error if passed inputs with very large exponents. The highest threat from this vulnerability is to system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* Since OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* In Service Telemetry Framework, because the flaw has a lower impact and the package is not directly used by STF, no updates will be provided at this time for the STF containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-33198"
},
{
"category": "external",
"summary": "RHBZ#1989575",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1989575"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33198"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI",
"url": "https://groups.google.com/g/golang-announce/c/RgCMkAEQjSI"
}
],
"release_date": "2021-03-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: math/big.Rat: may cause a panic or an unrecoverable fatal error if passed inputs with very large exponents"
},
{
"cve": "CVE-2021-34558",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2021-07-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1983596"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in golang. A panic can be triggered by an attacker in a privileged network position without access to the server certificate\u0027s private key, as long as a trusted ECDSA or Ed25519 certificate for the server exists (or can be issued), or the client is configured with Config.InsecureSkipVerify. Clients that disable all TLS_RSA cipher suites (that is, TLS 1.0\u20131.2 cipher suites without ECDHE), as well as TLS 1.3-only clients, are unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "* This vulnerability potentially affects any component written in Go that uses crypto/tls from the standard library. It is possible for components that make client connections to malicious servers to be exploited, however the maximum impact is a crash. This vulnerability is rated Low for the following components: \n - OpenShift Container Platform\n - OpenShift distributed tracing (formerly OpenShift Jaeger)\n - OpenShift Migration Toolkit for Containers\n - Red Hat Advanced Cluster Management for Kubernetes\n - Red Hat OpenShift on AWS\n - Red Hat OpenShift Virtualization\n\n* Because OpenShift Container Platform 3.11 is in Maintenance Phase of the support, only Important and Critical severity vulnerabilities will be addressed at this time.\n\n* Because Service Telemetry Framework1.2 will be retiring soon and the flaw\u0027s impact is lower, no update will be provided at this time for STF1.2\u0027s containers.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-34558"
},
{
"category": "external",
"summary": "RHBZ#1983596",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1983596"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-34558"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.15.minor",
"url": "https://golang.org/doc/devel/release#go1.15.minor"
},
{
"category": "external",
"summary": "https://golang.org/doc/devel/release#go1.16.minor",
"url": "https://golang.org/doc/devel/release#go1.16.minor"
}
],
"release_date": "2021-07-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: certificate of wrong type is causing TLS client to panic"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-2879",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132867"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where Reader.Read does not set a limit on the maximum size of file headers. After fixing, Reader.Read limits the maximum size of header blocks to 1 MiB. This flaw allows a maliciously crafted archive to cause Read to allocate unbounded amounts of memory, potentially causing resource exhaustion or panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.\n\n\nThis flaw additionally affects the github.com/vbatts/tar-split library and was fixed in v0.12.1.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2879"
},
{
"category": "external",
"summary": "RHBZ#2132867",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132867"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2879"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54853",
"url": "https://github.com/golang/go/issues/54853"
},
{
"category": "external",
"summary": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1",
"url": "https://github.com/vbatts/tar-split/releases/tag/v0.12.1"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: archive/tar: github.com/vbatts/tar-split: unbounded memory consumption when reading headers"
},
{
"acknowledgments": [
{
"names": [
"Daniel Abeles"
],
"organization": "Head of Research, Oxeye"
},
{
"names": [
"Gal Goldstein"
],
"organization": "Security Researcher, Oxeye"
}
],
"cve": "CVE-2022-2880",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132868"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go proxy forwards a parameter with an unparseable value. After the fix, the reverse proxy sanitizes the query parameters in the forwarded query when the outbound request\u0027s form field is set after the reverse proxy. The director function returns, indicating that the proxy has parsed the query parameters. Proxies that do not parse query parameters continue to forward the original query parameters unchanged.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity to exploit this vulnerability is limited to the Golang runtime. In the case of the OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-2880"
},
{
"category": "external",
"summary": "RHBZ#2132868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132868"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-2880"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/54663",
"url": "https://github.com/golang/go/issues/54663"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters"
},
{
"acknowledgments": [
{
"names": [
"Adam Korczynski"
],
"organization": "ADA Logics"
},
{
"names": [
"OSS-Fuzz"
]
}
],
"cve": "CVE-2022-41715",
"discovery_date": "2022-10-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2132872"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the golang package, where programs that compile regular expressions from untrusted sources are vulnerable to memory exhaustion or a denial of service. The parsed regexp representation is linear in the input size. Still, in some cases, the constant factor can be as high as 40,000, making a relatively small regexp consume larger amounts of memory. After the fix, each regexp being parsed is limited to a 256 MB memory footprint. Regular expressions whose representation would use more space than that are rejected. Routine use of regular expressions is unaffected.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: regexp/syntax: limit memory used by parsing regexps",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The opportunity for a Denial of Service is limited to the golang runtime. In the case of OpenShift Container Platform, this would be restricted within each individual container. There are multiple layers of guide rails (Golang\u2019s Garbage Collector; OpenShift\u2019s resource constraints imposed at the container and cluster levels) which would require a malicious user to continue submitting attacks for there to be any enduring impact. They would also need access to external server resources to be able to send a massive volume of requests to cause a significant impact on server operations.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-41715"
},
{
"category": "external",
"summary": "RHBZ#2132872",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2132872"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-41715"
},
{
"category": "external",
"summary": "https://github.com/golang/go/issues/55949",
"url": "https://github.com/golang/go/issues/55949"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1",
"url": "https://groups.google.com/g/golang-announce/c/xtuG5faxtaU?pli=1"
}
],
"release_date": "2022-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: regexp/syntax: limit memory used by parsing regexps"
},
{
"cve": "CVE-2023-29409",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-08-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2228743"
}
],
"notes": [
{
"category": "description",
"text": "A denial of service vulnerability was found in the Golang Go package caused by an uncontrolled resource consumption flaw. By persuading a victim to use a specially crafted certificate with large RSA keys, a remote attacker can cause a client/server to expend significant CPU time verifying signatures, resulting in a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-29409"
},
{
"category": "external",
"summary": "RHBZ#2228743",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2228743"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-29409"
},
{
"category": "external",
"summary": "https://go.dev/cl/515257",
"url": "https://go.dev/cl/515257"
},
{
"category": "external",
"summary": "https://go.dev/issue/61460",
"url": "https://go.dev/issue/61460"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ",
"url": "https://groups.google.com/g/golang-announce/c/X0b6CsSAaYI/m/Efv5DbZ9AwAJ"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-1987",
"url": "https://pkg.go.dev/vuln/GO-2023-1987"
}
],
"release_date": "2023-08-02T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: slow verification of certificate chains containing large RSA keys"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39318",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237776"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not properly handle HMTL-like \"\u003c!--\" and \"--\u003e\" comment tokens, nor hashbang \"#!\" comment tokens, in \u003cscript\u003e contexts. This issue may cause the template parser to improperly interpret the contents of \u003cscript\u003e contexts, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of HTML-like comments within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39318"
},
{
"category": "external",
"summary": "RHBZ#2237776",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237776"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39318"
},
{
"category": "external",
"summary": "https://go.dev/cl/526156",
"url": "https://go.dev/cl/526156"
},
{
"category": "external",
"summary": "https://go.dev/issue/62196",
"url": "https://go.dev/issue/62196"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2041.json",
"url": "https://vuln.go.dev/ID/GO-2023-2041.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of HTML-like comments within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Takeshi Kaneko"
],
"organization": "GMO Cybersecurity by Ierae, Inc."
}
],
"cve": "CVE-2023-39319",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237773"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. The html/template package did not apply the proper rules for handling occurrences of \"\u003cscript\", \"\u003c!--\", and \"\u003c/script\" within JS literals in \u003cscript\u003e contexts. This issue may cause the template parser to improperly consider script contexts to be terminated early, causing actions to be improperly escaped.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: html/template: improper handling of special tags within script contexts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39319"
},
{
"category": "external",
"summary": "RHBZ#2237773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39319"
},
{
"category": "external",
"summary": "https://go.dev/cl/526157",
"url": "https://go.dev/cl/526157"
},
{
"category": "external",
"summary": "https://go.dev/issue/62197",
"url": "https://go.dev/issue/62197"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2043.json",
"url": "https://vuln.go.dev/ID/GO-2023-2043.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: html/template: improper handling of special tags within script contexts"
},
{
"acknowledgments": [
{
"names": [
"Martin Seemann"
]
}
],
"cve": "CVE-2023-39321",
"cwe": {
"id": "CWE-805",
"name": "Buffer Access with Incorrect Length Value"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237777"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. Processing an incomplete post-handshake message for a QUIC connection caused a panic.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw has been marked as moderate instead of high like NVD \nQUICConn.HandleData buffers data and passes it to handlePostHandshakeMessage every time the buffer contains a complete message, while HandleData doesn\u0027t limit the amount of data it can buffer, a panic or denial of service would likely be lower severity,also in order to exploit this vulnerability, an attacker would have to smuggle partial handshake data which might be rejected altogether as per tls RFC specification.Therfore because of a lower severity denial of service and conditions that are beyond the scope of attackers control,we have marked this as moderate severity",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39321"
},
{
"category": "external",
"summary": "RHBZ#2237777",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237777"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39321"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2044.json",
"url": "https://vuln.go.dev/ID/GO-2023-2044.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: panic when processing post-handshake message on QUIC connections"
},
{
"acknowledgments": [
{
"names": [
"Marten Seemann"
]
}
],
"cve": "CVE-2023-39322",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-09-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2237778"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Golang. QUIC connections do not set an upper bound on the amount of data buffered when reading post-handshake messages, allowing a malicious QUIC connection to cause unbounded memory growth. With the fix, connections now consistently reject messages larger than 65KiB in size.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: lack of a limit on buffered post-handshake",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A vulnerability was found in the Go QUIC protocol implementation in the logic that processes post-handshake messages. It is an uncontrolled resource consumption flaw, triggered when a malicious connection sends data without an enforced upper bound. This leads to unbounded memory growth, causing the service to crash and resulting in a denial of service.The single-dimensional impact of denial of service and the added complexity of whether the resource exhaustion would happen, being out of an attacker\u0027s control,this has been rated as moderate severity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39322"
},
{
"category": "external",
"summary": "RHBZ#2237778",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2237778"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39322"
},
{
"category": "external",
"summary": "https://go.dev/cl/523039",
"url": "https://go.dev/cl/523039"
},
{
"category": "external",
"summary": "https://go.dev/issue/62266",
"url": "https://go.dev/issue/62266"
},
{
"category": "external",
"summary": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ",
"url": "https://groups.google.com/g/golang-dev/c/2C5vbR-UNkI/m/L1hdrPhfBAAJ"
},
{
"category": "external",
"summary": "https://vuln.go.dev/ID/GO-2023-2045.json",
"url": "https://vuln.go.dev/ID/GO-2023-2045.json"
}
],
"release_date": "2023-09-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: lack of a limit on buffered post-handshake"
},
{
"cve": "CVE-2023-39326",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2023-12-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253330"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang net/http/internal package. This issue may allow a malicious user to send an HTTP request and cause the receiver to read more bytes from network than are in the body (up to 1GiB), causing the receiver to fail reading the response, possibly leading to a Denial of Service (DoS).",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-39326"
},
{
"category": "external",
"summary": "RHBZ#2253330",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253330"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39326"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2382",
"url": "https://pkg.go.dev/vuln/GO-2023-2382"
}
],
"release_date": "2023-12-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "workaround",
"details": "No mitigation is available for this flaw.",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: net/http/internal: Denial of Service (DoS) via Resource Consumption via HTTP requests"
},
{
"cve": "CVE-2023-45287",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"discovery_date": "2023-12-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2253193"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Golang crypto/tls standard library. In previous versions, the package was vulnerable to a Timing Side Channel attack by observing the time it took for RSA-based TLS key exchanges, which was not constant. This flaw allows a malicious user to gather information from the environment.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges.",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified flaw in the Golang crypto/tls library, is assessed as a moderate severity issue rather than important due to several mitigating factors. Although the vulnerability exposes a Timing Side Channel, potentially allowing information retrieval through RSA-based TLS key exchanges, its exploitation demands significant access and expertise. Additionally, while earlier versions implemented RSA blinding to counter timing attacks, the removal of PKCS#1 padding may still leak timing data. However, the practicality of exploiting this flaw is limited, and the transition to a fully constant time RSA implementation in Go 1.20 significantly bolsters security, reducing the risk posed by timing side channels.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45287"
},
{
"category": "external",
"summary": "RHBZ#2253193",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253193"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45287"
},
{
"category": "external",
"summary": "https://pkg.go.dev/vuln/GO-2023-2375",
"url": "https://pkg.go.dev/vuln/GO-2023-2375"
}
],
"release_date": "2023-12-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "workaround",
"details": "No current mitigation is available for this vulnerability.",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "golang: crypto/tls: Timing Side Channel attack in RSA based TLS key exchanges."
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-222",
"name": "Truncation of Security-relevant Information"
},
"discovery_date": "2023-12-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2254210"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the SSH channel integrity. By manipulating sequence numbers during the handshake, an attacker can remove the initial messages on the secure channel without causing a MAC failure. For example, an attacker could disable the ping extension and thus disable the new countermeasure in OpenSSH 9.5 against keystroke timing attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "ssh: Prefix truncation attack on Binary Packet Protocol (BPP)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This CVE is classified as moderate because the attack requires an active Man-in-the-Middle (MITM) who can intercept and modify the connection\u0027s traffic at the TCP/IP layer.\n\nAlthough the attack is cryptographically innovative, its security impact is fortunately quite limited. It only allows the deletion of consecutive messages, and deleting most messages at this protocol stage prevents user authentication from proceeding, leading to a stalled connection.\n\nThe most significant identified impact is that it enables a MITM to delete the SSH2_MSG_EXT_INFO message sent before authentication begins. This allows the attacker to disable a subset of keystroke timing obfuscation features. However, there is no other observable impact on session secrecy or session integrity.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-48795"
},
{
"category": "external",
"summary": "RHBZ#2254210",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254210"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-48795"
},
{
"category": "external",
"summary": "https://access.redhat.com/solutions/7071748",
"url": "https://access.redhat.com/solutions/7071748"
},
{
"category": "external",
"summary": "https://terrapin-attack.com/",
"url": "https://terrapin-attack.com/"
}
],
"release_date": "2023-12-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "workaround",
"details": "Update to the last version and check that client and server provide kex pseudo-algorithms indicating usage of the updated version of the protocol which is protected from the attack. If \"kex-strict-c-v00@openssh.com\" is provided by clients and \"kex-strict-s-v00@openssh.com\" is in the server\u0027s reply, no other steps are necessary.\n\nDisabling ciphers if necessary:\n\nIf \"kex-strict-c-v00@openssh.com\" is not provided by clients or \"kex-strict-s-v00@openssh.com\" is absent in the server\u0027s reply, you can disable the following ciphers and HMACs as a workaround on RHEL-8 and RHEL-9:\n\n1. chacha20-poly1305@openssh.com\n2. hmac-sha2-512-etm@openssh.com\n3. hmac-sha2-256-etm@openssh.com\n4. hmac-sha1-etm@openssh.com\n5. hmac-md5-etm@openssh.com\n\nTo do that through crypto-policies, one can apply a subpolicy with the following content:\n```\ncipher@SSH = -CHACHA20-POLY1305\nssh_etm = 0\n```\ne.g., by putting these lines into `/etc/crypto-policies/policies/modules/CVE-2023-48795.pmod`, applying the resulting subpolicy with `update-crypto-policies --set $(update-crypto-policies --show):CVE-2023-48795` and restarting openssh server.\n\nOne can verify that the changes are in effect by ensuring the ciphers listed above are missing from both `/etc/crypto-policies/back-ends/openssh.config` and `/etc/crypto-policies/back-ends/opensshserver.config`.\n\nFor more details on using crypto-policies, please refer to https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/security_hardening/using-the-system-wide-cryptographic-policies_security-hardening\n\nNote that this procedure does limit the interoperability of the host and is only suggested as a temporary mitigation until the issue is fully resolved with an update.\n\nFor RHEL-7: \nWe can recommend to use strict MACs and Ciphers on RHEL7 in both files /etc/ssh/ssh_config and /etc/ssh/sshd_config.\n\nBelow strict set of Ciphers and MACs can be used as mitigation for RHEL 7.\n\n```\nCiphers aes128-ctr,aes192-ctr,aes256-ctr,aes128-gcm@openssh.com,aes256-gcm@openssh.com\nMACs umac-64@openssh.com,umac-128@openssh.com,hmac-sha2-256,hmac-sha2-512\n```\n\n- For Openshift Container Platform 4:\nPlease refer the KCS[1] document for verifying the fix in RHCOS.\n\n[1] https://access.redhat.com/solutions/7071748",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "ssh: Prefix truncation attack on Binary Packet Protocol (BPP)"
},
{
"cve": "CVE-2024-23650",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"discovery_date": "2024-02-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2262272"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the Moby Builder Toolkit. A malicious BuildKit client or any frontend that can craft a request could lead to the BuildKit daemon crashing with a panic due to the lack of input validation. A frontend is usually specified as the #syntax line on a Dockerfile or with the --frontend flag when using the buildctl build command.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "moby/buildkit: Possible race condition with accessing subpaths from cache mounts",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-23650"
},
{
"category": "external",
"summary": "RHBZ#2262272",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2262272"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23650",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23650"
},
{
"category": "external",
"summary": "https://github.com/moby/buildkit/security/advisories/GHSA-9p26-698r-w4hx",
"url": "https://github.com/moby/buildkit/security/advisories/GHSA-9p26-698r-w4hx"
}
],
"release_date": "2024-01-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "workaround",
"details": "Avoid using untrusted input for the client or frontend syntax to minimize the vulnerability exploration.",
"product_ids": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.src::container-tools:rhel8",
"AppStream-8.10.0.GA:aardvark-dns-2:1.10.0-1.module+el8.10.0+21209+52deeb51.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.src::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-debugsource-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:buildah-tests-debuginfo-2:1.33.6-2.module+el8.10.0+21371+46937ece.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:cockpit-podman-0:84.1-1.module+el8.10.0+21373+0d273fdf.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debuginfo-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:conmon-debugsource-3:2.1.10-1.module+el8.10.0+21077+98b84d8a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:container-selinux-2:2.229.0-2.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debuginfo-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containernetworking-plugins-debugsource-1:1.4.0-2.module+el8.10.0+21366+f9cb49f8.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:containers-common-2:1-81.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crit-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-debugsource-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-devel-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:criu-libs-debuginfo-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.src::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debuginfo-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:crun-debugsource-0:1.14.3-2.module+el8.10.0+21340+c6c7475a.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.src::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debuginfo-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:fuse-overlayfs-debugsource-0:1.13-1.module+el8.10.0+20412+95ee28e2.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.src::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debuginfo-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-debugsource-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:libslirp-devel-0:4.4.0-1.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:netavark-2:1.10.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.src::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debuginfo-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:oci-seccomp-bpf-hook-debugsource-0:1.2.10-1.module+el8.10.0+20565+a40ba0e5.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.src::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-catatonit-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-debugsource-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-docker-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-gvproxy-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-plugins-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-remote-debuginfo-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:podman-tests-3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.src::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-criu-0:3.18-4.module+el8.9.0+20326+387084d0.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:python3-podman-0:4.9.0-1.module+el8.10.0+21196+3f0abbca.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debuginfo-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:runc-debugsource-1:1.1.12-1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.src::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:skopeo-tests-2:1.14.3-0.1.module+el8.10.0+21251+62b7388c.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.src::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debuginfo-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:slirp4netns-debugsource-0:1.2.3-1.module+el8.10.0+21306+6be40ce7.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.src::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debuginfo-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-debugsource-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.aarch64::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.ppc64le::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.s390x::container-tools:rhel8",
"AppStream-8.10.0.GA:toolbox-tests-0:0.0.99.5-2.module+el8.10.0+21341+ff0b5f89.x86_64::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.noarch::container-tools:rhel8",
"AppStream-8.10.0.GA:udica-0:0.2.6-20.module+el8.9.0+20326+387084d0.src::container-tools:rhel8"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "moby/buildkit: Possible race condition with accessing subpaths from cache mounts"
}
]
}
RHSA-2024:2968
Vulnerability from csaf_redhat - Published: 2024-05-22 09:48 - Updated: 2026-04-01 18:56A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.
A cross-site scripting (XSS) flaw was found in Jinja2 due to the xmlattr filter allowing keys with spaces, contrary to XML/HTML attribute standards. If an application accepts user-input keys and renders them for other users, attackers can inject additional attributes, potentially leading to XSS. This misuse of the xmlattr filter enables the injection of arbitrary HTML attributes, bypassing auto-escaping and potentially circumventing attribute validation checks.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for fence-agents is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\n* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)\n\n* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2968",
"url": "https://access.redhat.com/errata/RHSA-2024:2968"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "2257854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854"
},
{
"category": "external",
"summary": "RHEL-14343",
"url": "https://issues.redhat.com/browse/RHEL-14343"
},
{
"category": "external",
"summary": "RHEL-5397",
"url": "https://issues.redhat.com/browse/RHEL-5397"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2968.json"
}
],
"title": "Red Hat Security Advisory: fence-agents security and bug fix update",
"tracking": {
"current_release_date": "2026-04-01T18:56:41+00:00",
"generator": {
"date": "2026-04-01T18:56:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:2968",
"initial_release_date": "2024-05-22T09:48:54+00:00",
"revision_history": [
{
"date": "2024-05-22T09:48:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T09:48:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:56:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-0:4.2.1-129.el8.src",
"product": {
"name": "fence-agents-0:4.2.1-129.el8.src",
"product_id": "fence-agents-0:4.2.1-129.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents@4.2.1-129.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-all-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-all-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"product": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"product_id": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-129.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-all-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun-debuginfo@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aliyun@4.2.1-129.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"product": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"product_id": "fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-openstack@4.2.1-129.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-all-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-all-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-all-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-all@4.2.1-129.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-kdump-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump@4.2.1-129.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt@4.2.1-129.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-redfish-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-redfish-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-redfish@4.2.1-129.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debugsource@4.2.1-129.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-debuginfo@4.2.1-129.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kdump-debuginfo@4.2.1-129.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"product": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"product_id": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-kubevirt-debuginfo@4.2.1-129.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-amt-ws@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-apc-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-apc-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-apc-snmp@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-bladecenter@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-brocade-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-brocade-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-brocade-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-brocade@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-mds@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-cisco-ucs@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-common-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-common-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-common-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-common@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-compute-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-compute-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-compute-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-compute@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-drac5-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-drac5-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-drac5-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-drac5@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eaton-snmp@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-emerson-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-emerson-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-emerson-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-emerson@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-eps-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-eps-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-eps-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-eps@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-heuristics-ping@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-hpblade@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-powervs@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibm-vpc@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ibmblade@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ifmib@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-moonshot@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-mp@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo-ssh@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ilo2@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-intelmodular@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipdu@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-ipmilan@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-lpar-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-lpar-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-lpar-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-lpar@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-mpath-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-mpath-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-mpath-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-mpath@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rhevm@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsa-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-rsa-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-rsa-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsa@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-rsb-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-rsb-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-rsb-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-rsb@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-sbd-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-sbd-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-sbd-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-sbd@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-scsi-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-scsi-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-scsi-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-scsi@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-virsh-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-virsh-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-virsh-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-virsh@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-rest@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-vmware-soap@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-wti-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-wti-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-wti-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-wti@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-zvm-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-zvm-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-zvm-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-zvm@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-aws-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-aws-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-aws-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-aws@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-azure-arm@4.2.1-129.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "fence-agents-gce-0:4.2.1-129.el8.noarch",
"product": {
"name": "fence-agents-gce-0:4.2.1-129.el8.noarch",
"product_id": "fence-agents-gce-0:4.2.1-129.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fence-agents-gce@4.2.1-129.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-129.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src"
},
"product_reference": "fence-agents-0:4.2.1-129.el8.src",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "AppStream-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-129.el8.src as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src"
},
"product_reference": "fence-agents-0:4.2.1-129.el8.src",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-0:4.2.1-129.el8.src as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src"
},
"product_reference": "fence-agents-0:4.2.1-129.el8.src",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-all-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-all-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-apc-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-aws-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-aws-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-brocade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-brocade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-common-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-common-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-compute-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-compute-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-drac5-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-drac5-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-emerson-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-emerson-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-eps-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-eps-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-gce-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-gce-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-hpblade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ifmib-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ilo2-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipdu-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-lpar-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-lpar-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-mpath-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-mpath-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-openstack-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-redfish-0:4.2.1-129.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64"
},
"product_reference": "fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rhevm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsa-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rsa-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-rsb-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-rsb-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-sbd-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-sbd-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-scsi-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-scsi-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-virsh-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-virsh-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-wti-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-wti-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fence-agents-zvm-0:4.2.1-129.el8.noarch as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
},
"product_reference": "fence-agents-zvm-0:4.2.1-129.el8.noarch",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2968"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
},
{
"cve": "CVE-2023-52323",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2024-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite ship affected version of pycryptodome for pulp_container, however, product is not vulnerable as it doesn\u0027t utilize OAEP algorithm technique. Red Hat Product Security has classified its impact as Low for Red Hat Satellite; future updates expected to address this issue.\n\nRed Hat OpenStack 16.1 and 16.2 versions include affected python-scciclient embedded through the python-crypto package, however, python-scciclient employs only one algorithm, which is AES. While the version of python-crypto we ship may be susceptible to a particular CVE, since affected algorithms are not utilized by OpenStack, the attack cannot be executed to exploit an OpenStack deployment",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52323"
},
{
"category": "external",
"summary": "RHBZ#2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323"
},
{
"category": "external",
"summary": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst",
"url": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst"
},
{
"category": "external",
"summary": "https://pypi.org/project/pycryptodomex/#history",
"url": "https://pypi.org/project/pycryptodomex/#history"
}
],
"release_date": "2024-01-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2968"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2024-01-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257854"
}
],
"notes": [
{
"category": "description",
"text": "A cross-site scripting (XSS) flaw was found in Jinja2 due to the xmlattr filter allowing keys with spaces, contrary to XML/HTML attribute standards. If an application accepts user-input keys and renders them for other users, attackers can inject additional attributes, potentially leading to XSS. This misuse of the xmlattr filter enables the injection of arbitrary HTML attributes, bypassing auto-escaping and potentially circumventing attribute validation checks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The identified issue is classified as moderate due to a cross-site scripting (XSS) vulnerability in Jinja2. This flaw arises from the xmlattr filter, which permits keys with spaces, contrary to XML/HTML attribute standards. In scenarios where an application accepts user-input keys and renders them for other users, attackers can exploit this vulnerability to inject additional attributes, potentially resulting in XSS attacks. The misuse of the xmlattr filter facilitates the injection of arbitrary HTML attributes, allowing attackers to bypass auto-escaping mechanisms and potentially evade attribute validation checks, posing a moderate security risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-22195"
},
{
"category": "external",
"summary": "RHBZ#2257854",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257854"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-22195"
},
{
"category": "external",
"summary": "https://github.com/pallets/jinja/releases/tag/3.1.3",
"url": "https://github.com/pallets/jinja/releases/tag/3.1.3"
},
{
"category": "external",
"summary": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95",
"url": "https://github.com/pallets/jinja/security/advisories/GHSA-h5c8-rqwp-cp95"
}
],
"release_date": "2024-01-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:48:54+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2968"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"AppStream-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"AppStream-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"AppStream-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"AppStream-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"HighAvailability-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"HighAvailability-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"HighAvailability-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-0:4.2.1-129.el8.src",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-aliyun-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-all-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-amt-ws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-apc-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-aws-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-azure-arm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-bladecenter-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-brocade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-mds-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-cisco-ucs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-common-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-compute-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-debugsource-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-drac5-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eaton-snmp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-emerson-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-eps-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-gce-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-heuristics-ping-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-hpblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-powervs-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibm-vpc-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ibmblade-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ifmib-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-moonshot-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-mp-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo-ssh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ilo2-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-intelmodular-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipdu-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-ipmilan-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kdump-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-kubevirt-debuginfo-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-lpar-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-mpath-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-openstack-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.aarch64",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.ppc64le",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.s390x",
"ResilientStorage-8.10.0.GA:fence-agents-redfish-0:4.2.1-129.el8.x86_64",
"ResilientStorage-8.10.0.GA:fence-agents-rhevm-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsa-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-rsb-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-sbd-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-scsi-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-virsh-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-rest-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-vmware-soap-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-wti-0:4.2.1-129.el8.noarch",
"ResilientStorage-8.10.0.GA:fence-agents-zvm-0:4.2.1-129.el8.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "jinja2: HTML attribute injection when passing user input as keys to xmlattr filter"
}
]
}
RHSA-2024:0464
Vulnerability from csaf_redhat - Published: 2024-01-25 11:05 - Updated: 2026-04-01 19:03A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0464",
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0464.json"
}
],
"title": "Red Hat Security Advisory: python-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:03:05+00:00",
"generator": {
"date": "2026-04-01T19:03:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:0464",
"initial_release_date": "2024-01-25T11:05:15+00:00",
"revision_history": [
{
"date": "2024-01-25T11:05:15+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-25T11:05:15+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:03:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.3.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"product": {
"name": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"product_id": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.26.5-3.el9_3.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"product": {
"name": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"product_id": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.26.5-3.el9_3.1?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.26.5-3.el9_3.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src"
},
"product_reference": "python-urllib3-0:1.26.5-3.el9_3.1.src",
"relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
},
"product_reference": "python3-urllib3-0:1.26.5-3.el9_3.1.noarch",
"relates_to_product_reference": "BaseOS-9.3.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T11:05:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-25T11:05:15+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-9.3.0.Z.MAIN:python-urllib3-0:1.26.5-3.el9_3.1.src",
"BaseOS-9.3.0.Z.MAIN:python3-urllib3-0:1.26.5-3.el9_3.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:0116
Vulnerability from csaf_redhat - Published: 2024-01-10 10:50 - Updated: 2026-04-01 19:03A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python-urllib3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:0116",
"url": "https://access.redhat.com/errata/RHSA-2024:0116"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_0116.json"
}
],
"title": "Red Hat Security Advisory: python-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:03:04+00:00",
"generator": {
"date": "2026-04-01T19:03:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:0116",
"initial_release_date": "2024-01-10T10:50:46+00:00",
"revision_history": [
{
"date": "2024-01-10T10:50:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-01-10T10:50:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:03:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.9.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-0:1.24.2-5.el8_9.2.src",
"product": {
"name": "python-urllib3-0:1.24.2-5.el8_9.2.src",
"product_id": "python-urllib3-0:1.24.2-5.el8_9.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.24.2-5.el8_9.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-0:1.24.2-5.el8_9.2.noarch",
"product": {
"name": "python3-urllib3-0:1.24.2-5.el8_9.2.noarch",
"product_id": "python3-urllib3-0:1.24.2-5.el8_9.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-urllib3@1.24.2-5.el8_9.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.24.2-5.el8_9.2.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src"
},
"product_reference": "python-urllib3-0:1.24.2-5.el8_9.2.src",
"relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-0:1.24.2-5.el8_9.2.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
},
"product_reference": "python3-urllib3-0:1.24.2-5.el8_9.2.noarch",
"relates_to_product_reference": "BaseOS-8.9.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-10T10:50:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0116"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-01-10T10:50:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:0116"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"BaseOS-8.9.0.Z.MAIN:python-urllib3-0:1.24.2-5.el8_9.2.src",
"BaseOS-8.9.0.Z.MAIN:python3-urllib3-0:1.24.2-5.el8_9.2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2025:0078
Vulnerability from csaf_redhat - Published: 2025-01-08 08:28 - Updated: 2026-04-01 19:06A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for python3.11-urllib3 is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems.\n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:0078",
"url": "https://access.redhat.com/errata/RHSA-2025:0078"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_0078.json"
}
],
"title": "Red Hat Security Advisory: python3.11-urllib3 security update",
"tracking": {
"current_release_date": "2026-04-01T19:06:42+00:00",
"generator": {
"date": "2026-04-01T19:06:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2025:0078",
"initial_release_date": "2025-01-08T08:28:52+00:00",
"revision_history": [
{
"date": "2025-01-08T08:28:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-01-08T08:28:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:06:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-1.el8_8.2.src",
"product": {
"name": "python3.11-urllib3-0:1.26.12-1.el8_8.2.src",
"product_id": "python3.11-urllib3-0:1.26.12-1.el8_8.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-1.el8_8.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"product": {
"name": "python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"product_id": "python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3.11-urllib3@1.26.12-1.el8_8.2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch"
},
"product_reference": "python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3.11-urllib3-0:1.26.12-1.el8_8.2.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.src"
},
"product_reference": "python3.11-urllib3-0:1.26.12-1.el8_8.2.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-01-08T08:28:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:0078"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.noarch",
"AppStream-8.8.0.Z.EUS:python3.11-urllib3-0:1.26.12-1.el8_8.2.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
RHSA-2024:2952
Vulnerability from csaf_redhat - Published: 2024-05-22 09:26 - Updated: 2026-04-01 18:56A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for resource-agents is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.\n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\n* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:2952",
"url": "https://access.redhat.com/errata/RHSA-2024:2952"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.10_release_notes/index"
},
{
"category": "external",
"summary": "1904465",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1904465"
},
{
"category": "external",
"summary": "2076403",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2076403"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "RHEL-17416",
"url": "https://issues.redhat.com/browse/RHEL-17416"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2952.json"
}
],
"title": "Red Hat Security Advisory: resource-agents security and bug fix update",
"tracking": {
"current_release_date": "2026-04-01T18:56:39+00:00",
"generator": {
"date": "2026-04-01T18:56:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2024:2952",
"initial_release_date": "2024-05-22T09:26:27+00:00",
"revision_history": [
{
"date": "2024-05-22T09:26:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-05-22T09:26:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T18:56:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::highavailability"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::resilientstorage"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8.src",
"product": {
"name": "resource-agents-0:4.9.0-54.el8.src",
"product_id": "resource-agents-0:4.9.0-54.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8.aarch64",
"product": {
"name": "resource-agents-0:4.9.0-54.el8.aarch64",
"product_id": "resource-agents-0:4.9.0-54.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8.aarch64",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8.aarch64",
"product_id": "resource-agents-paf-0:4.9.0-54.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8.ppc64le",
"product": {
"name": "resource-agents-0:4.9.0-54.el8.ppc64le",
"product_id": "resource-agents-0:4.9.0-54.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"product_id": "resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8.x86_64",
"product": {
"name": "resource-agents-0:4.9.0-54.el8.x86_64",
"product_id": "resource-agents-0:4.9.0-54.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"product": {
"name": "resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"product_id": "resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun@4.9.0-54.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"product": {
"name": "resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"product_id": "resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-gcp@4.9.0-54.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8.x86_64",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8.x86_64",
"product_id": "resource-agents-paf-0:4.9.0-54.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"product": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"product_id": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-aliyun-debuginfo@4.9.0-54.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "resource-agents-0:4.9.0-54.el8.s390x",
"product": {
"name": "resource-agents-0:4.9.0-54.el8.s390x",
"product_id": "resource-agents-0:4.9.0-54.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents@4.9.0-54.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "resource-agents-paf-0:4.9.0-54.el8.s390x",
"product": {
"name": "resource-agents-paf-0:4.9.0-54.el8.s390x",
"product_id": "resource-agents-paf-0:4.9.0-54.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-paf@4.9.0-54.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"product": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"product_id": "resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debugsource@4.9.0-54.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"product": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"product_id": "resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resource-agents-debuginfo@4.9.0-54.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.src as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.src",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux HighAvailability (v. 8)",
"product_id": "HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "HighAvailability-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.src as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.src",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debuginfo-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-debugsource-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-gcp-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.aarch64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.aarch64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.ppc64le as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.s390x as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.s390x",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resource-agents-paf-0:4.9.0-54.el8.x86_64 as a component of Red Hat Enterprise Linux ResilientStorage (v. 8)",
"product_id": "ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
},
"product_reference": "resource-agents-paf-0:4.9.0-54.el8.x86_64",
"relates_to_product_reference": "ResilientStorage-8.10.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:26:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2952"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
},
{
"cve": "CVE-2023-52323",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"discovery_date": "2024-01-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2257028"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in PyCryptodome/pycryptodomex which may allow for side-channel leakage when performing OAEP decryption, which could be exploited to carry out a Manger attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Satellite ship affected version of pycryptodome for pulp_container, however, product is not vulnerable as it doesn\u0027t utilize OAEP algorithm technique. Red Hat Product Security has classified its impact as Low for Red Hat Satellite; future updates expected to address this issue.\n\nRed Hat OpenStack 16.1 and 16.2 versions include affected python-scciclient embedded through the python-crypto package, however, python-scciclient employs only one algorithm, which is AES. While the version of python-crypto we ship may be susceptible to a particular CVE, since affected algorithms are not utilized by OpenStack, the attack cannot be executed to exploit an OpenStack deployment",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52323"
},
{
"category": "external",
"summary": "RHBZ#2257028",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257028"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52323"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52323"
},
{
"category": "external",
"summary": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst",
"url": "https://github.com/Legrandin/pycryptodome/blob/master/Changelog.rst"
},
{
"category": "external",
"summary": "https://pypi.org/project/pycryptodomex/#history",
"url": "https://pypi.org/project/pycryptodomex/#history"
}
],
"release_date": "2024-01-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-05-22T09:26:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:2952"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"HighAvailability-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"HighAvailability-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.src",
"ResilientStorage-8.10.0.GA:resource-agents-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-aliyun-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debuginfo-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-debugsource-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-gcp-0:4.9.0-54.el8.x86_64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.aarch64",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.ppc64le",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.s390x",
"ResilientStorage-8.10.0.GA:resource-agents-paf-0:4.9.0-54.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex"
}
]
}
RHSA-2023:7851
Vulnerability from csaf_redhat - Published: 2023-12-14 16:30 - Updated: 2026-04-01 19:03A sensitive information exposure vulnerability was found in foreman. Contents of tomcat's server.xml file, which contain passwords to candlepin's keystore and truststore, were found to be world readable.
A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.
A path traversal vulnerability was found in GitPython due to an input validation error when reading from the ".git" directory. This issue may allow a remote attacker to prepare a specially crafted ".git" file with directory traversal characters in file names and force the application to read these files from the local system, which can result in checking for the existence of a specific file on the system or allow a denial of service (DoS) attack.
A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn't treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn't disable redirects explicitly.
A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn't exploitable.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated Satellite 6.14 packages that fixes Important security bugs and several\nregular bugs are now available for Red Hat Satellite.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Satellite is a system management solution that allows organizations\nto configure and maintain their systems without the necessity to provide\npublic Internet access to their servers or other client systems. It\nperforms provisioning and configuration management of predefined standard\noperating environments.\n\nSecurity fix(es):\n\n* rubygem-actionpack: actionpack: Possible XSS via User Supplied Values to redirect_to [rhn_satellite_6.14] (CVE-2023-28362)\n\n* foreman: World readable file containing secrets [rhn_satellite_6.14] (CVE-2023-4886)\n\n* python-urllib3: urllib3: Request body not stripped after redirect from 303 status changes request method to GET [rhn_satellite_6-default] (CVE-2023-45803 )\n\n* python-gitpython: GitPython: Blind local file inclusion [rhn_satellite_6-default] (CVE-2023-41040)\n\nThis update fixes the following bugs:\n\n2250342 - REX job finished with exit code 0 but the script failed on client side due to no space.\n2250343 - Selinux denials are reported after following \"Chapter 13. Managing Custom File Type Content\" chapter step by step\n2250344 - Long running postgres threads during content-export\n2250345 - Upgrade django-import-export package to at least 3.1.0\n2250349 - After upstream repo switched to zst compression, Satellite 6.12.5.1 unable to sync\n2250350 - Slow generate applicability for Hosts with multiple modulestreams installed\n2250352 - Recalculate button for Errata is not available on Satellite 6.13/ Satellite 6.14 if no errata is present\n2250351 - Actions::ForemanLeapp::PreupgradeJob fails with null value in column \"preupgrade_report_id\" violates not-null constraint when run with non-admin user\n2251799 - REX Template for \u0027convert2rhel analyze\u0027 command\n2254085 - Getting \u0027/usr/sbin/foreman-rake db:migrate\u0027 returned 1 instead of one of [0] ERROR while trying to upgrade Satellite 6.13 to 6.14 \n2254080 - satellite-convert2rhel-toolkit rpm v1.0.0 in 6.14.z\n\nUsers of Red Hat Satellite are advised to upgrade to these updated\npackages, which fix these bugs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7851",
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_satellite/6.14/html/upgrading_red_hat_satellite_to_6.14/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_satellite/6.14/html/upgrading_red_hat_satellite_to_6.14/index"
},
{
"category": "external",
"summary": "2217785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217785"
},
{
"category": "external",
"summary": "2230135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230135"
},
{
"category": "external",
"summary": "2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "2247040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247040"
},
{
"category": "external",
"summary": "2250342",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250342"
},
{
"category": "external",
"summary": "2250343",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250343"
},
{
"category": "external",
"summary": "2250344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250344"
},
{
"category": "external",
"summary": "2250345",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250345"
},
{
"category": "external",
"summary": "2250349",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250349"
},
{
"category": "external",
"summary": "2250350",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250350"
},
{
"category": "external",
"summary": "2250351",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250351"
},
{
"category": "external",
"summary": "2250352",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2250352"
},
{
"category": "external",
"summary": "2251799",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251799"
},
{
"category": "external",
"summary": "2254080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254080"
},
{
"category": "external",
"summary": "2254085",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254085"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7851.json"
}
],
"title": "Red Hat Security Advisory: Satellite 6.14.1 Async Security Update",
"tracking": {
"current_release_date": "2026-04-01T19:03:06+00:00",
"generator": {
"date": "2026-04-01T19:03:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.4"
}
},
"id": "RHSA-2023:7851",
"initial_release_date": "2023-12-14T16:30:08+00:00",
"revision_history": [
{
"date": "2023-12-14T16:30:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-14T16:30:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-04-01T19:03:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product": {
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:satellite:6.14::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product": {
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:satellite_capsule:6.14::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product": {
"name": "Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:satellite_utils:6.14::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat Satellite 6"
},
{
"branches": [
{
"category": "product_version",
"name": "createrepo_c-0:1.0.2-2.el8pc.src",
"product": {
"name": "createrepo_c-0:1.0.2-2.el8pc.src",
"product_id": "createrepo_c-0:1.0.2-2.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c@1.0.2-2.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "foreman-0:3.7.0.10-1.el8sat.src",
"product": {
"name": "foreman-0:3.7.0.10-1.el8sat.src",
"product_id": "foreman-0:3.7.0.10-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman@3.7.0.10-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"product": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"product_id": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-installer@3.7.0.5-1.el8sat?arch=src\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python-django-import-export-0:3.1.0-1.el8pc.src",
"product": {
"name": "python-django-import-export-0:3.1.0-1.el8pc.src",
"product_id": "python-django-import-export-0:3.1.0-1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-django-import-export@3.1.0-1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"product": {
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"product_id": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-gitpython@3.1.40-0.1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pulpcore-0:3.22.19-1.el8pc.src",
"product": {
"name": "python-pulpcore-0:3.22.19-1.el8pc.src",
"product_id": "python-pulpcore-0:3.22.19-1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pulpcore@3.22.19-1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"product": {
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"product_id": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-pulp-rpm@3.19.11-2.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"product": {
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"product_id": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-urllib3@1.26.18-0.1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actioncable@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailbox@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailer@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionpack@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actiontext@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionview@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activejob@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activemodel@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activerecord@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activestorage@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activesupport@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rails@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"product": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"product_id": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-railties@6.1.7.4-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"product": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"product_id": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-smart_proxy_remote_execution_ssh@0.10.2-2.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "satellite-0:6.14.1-1.el8sat.src",
"product": {
"name": "satellite-0:6.14.1-1.el8sat.src",
"product_id": "satellite-0:6.14.1-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite@6.14.1-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"product": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"product_id": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_remote_execution@10.1.2-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"product": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"product_id": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-katello@4.9.0.18-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"product": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"product_id": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pulpcore-selinux@2.0.0-1.el8pc?arch=src"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"product": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"product_id": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_leapp@1.1.0-1.el8sat?arch=src"
}
}
},
{
"category": "product_version",
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"product": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"product_id": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-convert2rhel-toolkit@1.0.0-1.el8sat?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-libs@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_id": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-createrepo_c@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_id": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-createrepo_c@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-debugsource@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/createrepo_c-libs-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-createrepo_c-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product": {
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_id": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-createrepo_c-debuginfo@1.0.2-2.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"product": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"product_id": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pulpcore-selinux@2.0.0-1.el8pc?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"product": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"product_id": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-convert2rhel-toolkit@1.0.0-1.el8sat?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-cli@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-debug@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-dynflow-sidekiq@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-ec2@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-journald@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-libvirt@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-openstack@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-ovirt@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-postgresql@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-redis@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-service@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-telemetry@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"product": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"product_id": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-vmware@3.7.0.10-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"product": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"product_id": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-installer@3.7.0.5-1.el8sat?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"product": {
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"product_id": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/foreman-installer-katello@3.7.0.5-1.el8sat?arch=noarch\u0026epoch=1"
}
}
},
{
"category": "product_version",
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"product": {
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"product_id": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-django-import-export@3.1.0-1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"product": {
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"product_id": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-gitpython@3.1.40-0.1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"product": {
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"product_id": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pulpcore@3.22.19-1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"product": {
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"product_id": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-pulp-rpm@3.19.11-2.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"product": {
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"product_id": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python39-urllib3@1.26.18-0.1.el8pc?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actioncable@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailbox@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionmailer@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionpack@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actiontext@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-actionview@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activejob@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activemodel@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activerecord@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activestorage@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-activesupport@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-rails@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"product": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"product_id": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-railties@6.1.7.4-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"product": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"product_id": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-smart_proxy_remote_execution_ssh@0.10.2-2.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-cli@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-capsule@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-common-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-common-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite-common@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "satellite-0:6.14.1-1.el8sat.noarch",
"product": {
"name": "satellite-0:6.14.1-1.el8sat.noarch",
"product_id": "satellite-0:6.14.1-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/satellite@6.14.1-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"product": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"product_id": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_remote_execution@10.1.2-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"product": {
"name": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"product_id": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_remote_execution-cockpit@10.1.2-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"product": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"product_id": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-katello@4.9.0.18-1.el8sat?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"product": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"product_id": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rubygem-foreman_leapp@1.1.0-1.el8sat?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-django-import-export-0:3.1.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src"
},
"product_reference": "python-django-import-export-0:3.1.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src"
},
"product_reference": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src"
},
"product_reference": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulpcore-0:3.22.19-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src"
},
"product_reference": "python-pulpcore-0:3.22.19-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src"
},
"product_reference": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch"
},
"product_reference": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
},
"product_reference": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch"
},
"product_reference": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch"
},
"product_reference": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
},
"product_reference": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-common-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-capsule"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-common-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14-utils"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-0:3.7.0.10-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src"
},
"product_reference": "foreman-0:3.7.0.10-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-cli-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-debug-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-1:3.7.0.5-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src"
},
"product_reference": "foreman-installer-1:3.7.0.5-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch"
},
"product_reference": "foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-journald-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-redis-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-service-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-service-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
},
"product_reference": "foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64"
},
"product_reference": "pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-django-import-export-0:3.1.0-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src"
},
"product_reference": "python-django-import-export-0:3.1.0-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-gitpython-0:3.1.40-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src"
},
"product_reference": "python-gitpython-0:3.1.40-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulp-rpm-0:3.19.11-2.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src"
},
"product_reference": "python-pulp-rpm-0:3.19.11-2.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-pulpcore-0:3.22.19-1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src"
},
"product_reference": "python-pulpcore-0:3.22.19-1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-0:1.26.18-0.1.el8pc.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src"
},
"product_reference": "python-urllib3-0:1.26.18-0.1.el8pc.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64"
},
"product_reference": "python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-django-import-export-0:3.1.0-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch"
},
"product_reference": "python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
},
"product_reference": "python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch"
},
"product_reference": "python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-pulpcore-0:3.22.19-1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch"
},
"product_reference": "python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
},
"product_reference": "python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-actionview-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activejob-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch"
},
"product_reference": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src"
},
"product_reference": "rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch"
},
"product_reference": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src"
},
"product_reference": "rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch"
},
"product_reference": "rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch"
},
"product_reference": "rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-katello-0:4.9.0.18-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src"
},
"product_reference": "rubygem-katello-0:4.9.0.18-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-rails-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-rails-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch"
},
"product_reference": "rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-railties-0:6.1.7.4-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src"
},
"product_reference": "rubygem-railties-0:6.1.7.4-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src"
},
"product_reference": "rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-0:6.14.1-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src"
},
"product_reference": "satellite-0:6.14.1-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-capsule-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-capsule-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-cli-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-cli-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-common-0:6.14.1-1.el8sat.noarch as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch"
},
"product_reference": "satellite-common-0:6.14.1-1.el8sat.noarch",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src"
},
"product_reference": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"relates_to_product_reference": "8Base-satellite-6.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64 as a component of Red Hat Satellite 6.14 for RHEL 8",
"product_id": "8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
},
"product_reference": "satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64",
"relates_to_product_reference": "8Base-satellite-6.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-4886",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-08-08T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2230135"
}
],
"notes": [
{
"category": "description",
"text": "A sensitive information exposure vulnerability was found in foreman. Contents of tomcat\u0027s server.xml file, which contain passwords to candlepin\u0027s keystore and truststore, were found to be world readable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "foreman: World readable file containing secrets",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw has a limited impact on security, as candlepin\u0027s individual stores\u0027 privileges are limited to root and tomcat only. Therefore, the impact is limited to highly privileged users.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-4886"
},
{
"category": "external",
"summary": "RHBZ#2230135",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2230135"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-4886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4886"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-4886",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-4886"
}
],
"release_date": "2023-10-03T14:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "foreman: World readable file containing secrets"
},
{
"cve": "CVE-2023-28362",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2023-06-27T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2217785"
}
],
"notes": [
{
"category": "description",
"text": "A Cross-site Scripting (XSS) vulnerability was found in Actionpack due to improper sanitization of user-supplied values. This allows provided values to contain characters that are not legal in an HTTP header value. This results in the potential for downstream services which enforce RFC compliance on HTTP response headers to remove the assigned location header.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "actionpack: Possible XSS via User Supplied Values to redirect_to",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-28362"
},
{
"category": "external",
"summary": "RHBZ#2217785",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2217785"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28362"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28362",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28362"
},
{
"category": "external",
"summary": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-28362.yml",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2023-28362.yml"
}
],
"release_date": "2023-06-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "actionpack: Possible XSS via User Supplied Values to redirect_to"
},
{
"cve": "CVE-2023-41040",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2023-10-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2247040"
}
],
"notes": [
{
"category": "description",
"text": "A path traversal vulnerability was found in GitPython due to an input validation error when reading from the \".git\" directory. This issue may allow a remote attacker to prepare a specially crafted \".git\" file with directory traversal characters in file names and force the application to read these files from the local system, which can result in checking for the existence of a specific file on the system or allow a denial of service (DoS) attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "GitPython: Blind local file inclusion",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability cannot be used to read the contents of files but could be used to trigger a denial of service for the program.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-41040"
},
{
"category": "external",
"summary": "RHBZ#2247040",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2247040"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-41040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41040"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41040",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41040"
},
{
"category": "external",
"summary": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c",
"url": "https://github.com/gitpython-developers/GitPython/security/advisories/GHSA-cwvm-v4w8-q58c"
}
],
"release_date": "2023-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "GitPython: Blind local file inclusion"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-06T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2242493"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, which is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "RHBZ#2242493",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2242493"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-43804"
}
],
"release_date": "2023-10-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2023-10-29T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246840"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in urllib3, an HTTP client library for Python. urllib3 doesn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303, after changing the method in a request from one that could accept a request body such as `POST` to `GET`, as is required by HTTP RFCs. This issue requires a previously trusted service to become compromised in order to have an impact on confidentiality, therefore, the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies; if this is the case, this vulnerability isn\u0027t exploitable.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Both of the following conditions must be true to be affected by this vulnerability: \n1. Using urllib3 and submitting sensitive information in the HTTP request body such as form data or JSON\n2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
],
"known_not_affected": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "RHBZ#2246840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246840"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"category": "external",
"summary": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"category": "external",
"summary": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"release_date": "2023-10-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-14T16:30:08+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7851"
},
{
"category": "workaround",
"details": "Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False`, disable automatic redirects with `redirects=False`, and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"product_ids": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14-capsule:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14-capsule:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14-capsule:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14-capsule:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14-capsule:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14-capsule:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14-capsule:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14-capsule:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-capsule:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-capsule:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14-utils:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14-utils:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14-utils:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.src",
"8Base-satellite-6.14:createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-debugsource-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:createrepo_c-libs-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-0:3.7.0.10-1.el8sat.src",
"8Base-satellite-6.14:foreman-cli-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-debug-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-dynflow-sidekiq-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ec2-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-installer-1:3.7.0.5-1.el8sat.src",
"8Base-satellite-6.14:foreman-installer-katello-1:3.7.0.5-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-journald-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-libvirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-openstack-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-ovirt-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-postgresql-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-redis-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-service-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-telemetry-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:foreman-vmware-0:3.7.0.10-1.el8sat.noarch",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.src",
"8Base-satellite-6.14:pulpcore-selinux-0:2.0.0-1.el8pc.x86_64",
"8Base-satellite-6.14:python-django-import-export-0:3.1.0-1.el8pc.src",
"8Base-satellite-6.14:python-gitpython-0:3.1.40-0.1.el8pc.src",
"8Base-satellite-6.14:python-pulp-rpm-0:3.19.11-2.el8pc.src",
"8Base-satellite-6.14:python-pulpcore-0:3.22.19-1.el8pc.src",
"8Base-satellite-6.14:python-urllib3-0:1.26.18-0.1.el8pc.src",
"8Base-satellite-6.14:python3-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python3-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-createrepo_c-debuginfo-0:1.0.2-2.el8pc.x86_64",
"8Base-satellite-6.14:python39-django-import-export-0:3.1.0-1.el8pc.noarch",
"8Base-satellite-6.14:python39-gitpython-0:3.1.40-0.1.el8pc.noarch",
"8Base-satellite-6.14:python39-pulp-rpm-0:3.19.11-2.el8pc.noarch",
"8Base-satellite-6.14:python39-pulpcore-0:3.22.19-1.el8pc.noarch",
"8Base-satellite-6.14:python39-urllib3-0:1.26.18-0.1.el8pc.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actioncable-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailbox-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionmailer-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionpack-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actiontext-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-actionview-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activejob-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activemodel-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activerecord-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activestorage-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-activesupport-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_leapp-0:1.1.0-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-0:10.1.2-1.el8sat.src",
"8Base-satellite-6.14:rubygem-foreman_remote_execution-cockpit-0:10.1.2-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-katello-0:4.9.0.18-1.el8sat.src",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-rails-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.noarch",
"8Base-satellite-6.14:rubygem-railties-0:6.1.7.4-1.el8sat.src",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.noarch",
"8Base-satellite-6.14:rubygem-smart_proxy_remote_execution_ssh-0:0.10.2-2.el8sat.src",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-0:6.14.1-1.el8sat.src",
"8Base-satellite-6.14:satellite-capsule-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-cli-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-common-0:6.14.1-1.el8sat.noarch",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.src",
"8Base-satellite-6.14:satellite-convert2rhel-toolkit-0:1.0.0-1.el8sat.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "urllib3: Request body not stripped after redirect from 303 status changes request method to GET"
}
]
}
CERTFR-2025-AVI-0135
Vulnerability from certfr_avis - Published: 2025-02-14 - Updated: 2025-02-14
De multiples vulnérabilités ont été découvertes dans IBM QRadar Deployment Intelligence App. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | QRadar Deployment Intelligence App versions antérieures à 3.0.16 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.16",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-42459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42459"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2024-42460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42460"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2018-18074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18074"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2024-52798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52798"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2024-42461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42461"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2025-02-14T00:00:00",
"last_revision_date": "2025-02-14T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0135",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-14T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans IBM QRadar Deployment Intelligence App. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM QRadar Deployment Intelligence App",
"vendor_advisories": [
{
"published_at": "2025-02-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182930",
"url": "https://www.ibm.com/support/pages/node/7182930"
}
]
}
CERTFR-2024-AVI-0385
Vulnerability from certfr_avis - Published: 2024-05-10 - Updated: 2024-05-10
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.2.x antérieures à 6.2.0.23 | ||
| IBM | N/A | AIX et VIOS sans le dernier correctif de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions antérieures à 6.1.0.24 | ||
| IBM | QRadar | SOAR QRadar Plugin App versions antérieures à 5.4.0 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.7 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF02 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Sterling Connect:Direct Web Services (Certified Container) toutes versions sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX et VIOS sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions ant\u00e9rieures \u00e0 6.1.0.24",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "SOAR QRadar Plugin App versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.7",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF02",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2024-27273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27273"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-45688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45688"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2023-5072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5072"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2023-44794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44794"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2023-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36478"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
}
],
"initial_release_date": "2024-05-10T00:00:00",
"last_revision_date": "2024-05-10T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0385",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-05-10T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0\ndistance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150297 du 06 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150297"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150684 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150684"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150803 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150803"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150277 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150277"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150196 du 03 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150196"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150798 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150798"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150804 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150804"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150799 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150799"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150276 du 05 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150276"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150802 du 09 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150802"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7150362 du 07 mai 2024",
"url": "https://www.ibm.com/support/pages/node/7150362"
}
]
}
CERTFR-2026-AVI-0316
Vulnerability from certfr_avis - Published: 2026-03-19 - Updated: 2026-03-19
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.82 | ||
| VMware | Tanzu Platform | Tanzu for MySQL sur Tanzu Platform versions antérieures à 10.1.1 | ||
| VMware | N/A | Java Buildpack versions antérieures à 4.90.0 | ||
| VMware | N/A | NGINX Buildpack versions antérieures à 1.2.71 | ||
| VMware | N/A | HWC Buildpack versions antérieures à 3.1.91 | ||
| VMware | Tanzu Platform | Foundation Core for VMware Tanzu Platform versions antérieures à 3.1.9 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.82",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.90.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NGINX Buildpack versions ant\u00e9rieures \u00e0 1.2.71",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "HWC Buildpack versions ant\u00e9rieures \u00e0 3.1.91",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2025-47908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47908"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2026-1229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1229"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
}
],
"initial_release_date": "2026-03-19T00:00:00",
"last_revision_date": "2026-03-19T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0316",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37219",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37219"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37211",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37211"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37215",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37215"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37218",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37218"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37220",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37220"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37216",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37216"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37221",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37221"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37213",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37213"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37217",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37217"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37212",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37212"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37214",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37214"
},
{
"published_at": "2026-03-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37222",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37222"
}
]
}
CERTFR-2024-AVI-0579
Vulnerability from certfr_avis - Published: 2024-07-12 - Updated: 2024-07-12
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Spectrum | Spectrum Control versions antérieures à 5.4.12 | ||
| IBM | WebSphere | WebSphere Application Server versions 8.5.x antérieures à 8.5.5.25 sans le correctif de sécurité PH61489 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x antérieures à 9.0.5.20 sans le correctif de sécurité PH61489 | ||
| IBM | QRadar | QRadar Deployment Intelligence App versions antérieures à 3.0.14 | ||
| IBM | QRadar | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP9 | ||
| IBM | Cloud Pak | Cloud Pak for Security versions antérieures à 1.10.23.0 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar Suite Software versions antérieures à 1.10.23.0 | ||
| IBM | QRadar | Security QRadar EDR versions antérieures à 3.12.9 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 sans le correctif de sécurité 9211224a.240708.epkg.Z | ||
| IBM | QRadar | QRadar WinCollect Agent versions antérieures à 10.1.11 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Spectrum Control versions ant\u00e9rieures \u00e0 5.4.12",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.25 sans le correctif de s\u00e9curit\u00e9 PH61489",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x ant\u00e9rieures \u00e0 9.0.5.20 sans le correctif de s\u00e9curit\u00e9 PH61489",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.14",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Security versions ant\u00e9rieures \u00e0 1.10.23.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions ant\u00e9rieures \u00e0 1.10.23.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.9",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 sans le correctif de s\u00e9curit\u00e9 9211224a.240708.epkg.Z",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar WinCollect Agent versions ant\u00e9rieures \u00e0 10.1.11",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-35154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35154"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2024-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3772"
},
{
"name": "CVE-2023-50312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50312"
},
{
"name": "CVE-2024-2466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2466"
},
{
"name": "CVE-2024-28102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28102"
},
{
"name": "CVE-2024-34069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34069"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2024-34997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34997"
},
{
"name": "CVE-2022-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-45802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2024-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2024-1135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1135"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-2379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2379"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-31122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-51775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51775"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
},
{
"name": "CVE-2024-5206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5206"
},
{
"name": "CVE-2024-27088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27088"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2023-44483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44483"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27270",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27270"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2024-6387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6387"
},
{
"name": "CVE-2024-25023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25023"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
}
],
"initial_release_date": "2024-07-12T00:00:00",
"last_revision_date": "2024-07-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0579",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159768",
"url": "https://www.ibm.com/support/pages/node/7159768"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160017",
"url": "https://www.ibm.com/support/pages/node/7160017"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159781",
"url": "https://www.ibm.com/support/pages/node/7159781"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160014",
"url": "https://www.ibm.com/support/pages/node/7160014"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160134",
"url": "https://www.ibm.com/support/pages/node/7160134"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159771",
"url": "https://www.ibm.com/support/pages/node/7159771"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159867",
"url": "https://www.ibm.com/support/pages/node/7159867"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159865",
"url": "https://www.ibm.com/support/pages/node/7159865"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159527",
"url": "https://www.ibm.com/support/pages/node/7159527"
},
{
"published_at": "2024-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159825",
"url": "https://www.ibm.com/support/pages/node/7159825"
},
{
"published_at": "2024-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159934",
"url": "https://www.ibm.com/support/pages/node/7159934"
},
{
"published_at": "2024-07-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7159920",
"url": "https://www.ibm.com/support/pages/node/7159920"
},
{
"published_at": "2024-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160013",
"url": "https://www.ibm.com/support/pages/node/7160013"
}
]
}
CERTFR-2024-AVI-0692
Vulnerability from certfr_avis - Published: 2024-08-16 - Updated: 2024-08-16
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar | Security QRadar EDR versions 3.12.x antérieures à 3.12.10 | ||
| IBM | WebSphere | IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions antérieures à 8 Service Refresh 8 FP30 | ||
| IBM | Db2 | Db2 Big SQL on Cloud Pak for Data versions 7.2.x à 7.5.x antérieures à 7.5.3 | ||
| IBM | Db2 | Db2 versions 11.5.x sans le dernier correctif de sécurité | ||
| IBM | AIX | AIX version 7.3 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | QRadar SIEM | QRadar Suite versions 1.10.x antérieures à 1.10.24.0 | ||
| IBM | VIOS | VIOS version 4.1 avec un version de Python 3.9 antérieure à 3.9.19.2 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x antérieures à 8.5.5.11 ou sans le correctif de sécurité temporaire PH62458 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.2.x antérieures à 6.2.1.0 GA iFix13 | ||
| IBM | Sterling Connect:Direct | Sterling Control Center versions 6.3.x antérieures à 6.3.1.0 GA iFix02 | ||
| IBM | Cognos Analytics | Cognos Dashboards on Cloud Pak for Data versions antérieures à 5.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.10",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server version 9.0 avec Java Technology Edition versions ant\u00e9rieures \u00e0 8 Service Refresh 8 FP30",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Big SQL on Cloud Pak for Data versions 7.2.x \u00e0 7.5.x ant\u00e9rieures \u00e0 7.5.3",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions 11.5.x sans le dernier correctif de s\u00e9curit\u00e9 ",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX version 7.3 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite versions 1.10.x ant\u00e9rieures \u00e0 1.10.24.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un version de Python 3.9 ant\u00e9rieure \u00e0 3.9.19.2",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.11 ou sans le correctif de s\u00e9curit\u00e9 temporaire PH62458",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.x ant\u00e9rieures \u00e0 6.2.1.0 GA iFix13",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.x ant\u00e9rieures \u00e0 6.3.1.0 GA iFix02",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions ant\u00e9rieures \u00e0 5.0.0",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2023-23613",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23613"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2023-29256",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29256"
},
{
"name": "CVE-2024-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21890"
},
{
"name": "CVE-2024-21896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21896"
},
{
"name": "CVE-2023-30431",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30431"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2024-25024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25024"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-35012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35012"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30443",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30443"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-27869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27869"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2023-30446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30446"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2023-27868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27868"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-37168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37168"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2022-41917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41917"
},
{
"name": "CVE-2024-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22019"
},
{
"name": "CVE-2024-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22233"
},
{
"name": "CVE-2023-30445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30445"
},
{
"name": "CVE-2023-30447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30447"
},
{
"name": "CVE-2024-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21634"
},
{
"name": "CVE-2023-30442",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30442"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2024-30261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30261"
},
{
"name": "CVE-2023-27867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27867"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21892"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-30448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30448"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27558"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2023-30449",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30449"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2024-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21891"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2024-30260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30260"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2024-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22017"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2023-23487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23487"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-28799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28799"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-27267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27267"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2023-23612",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23612"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2024-08-16T00:00:00",
"last_revision_date": "2024-08-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0692",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-16T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-08-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165247",
"url": "https://www.ibm.com/support/pages/node/7165247"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165360",
"url": "https://www.ibm.com/support/pages/node/7165360"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165340",
"url": "https://www.ibm.com/support/pages/node/7165340"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165344",
"url": "https://www.ibm.com/support/pages/node/7165344"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165423",
"url": "https://www.ibm.com/support/pages/node/7165423"
},
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165284",
"url": "https://www.ibm.com/support/pages/node/7165284"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165362",
"url": "https://www.ibm.com/support/pages/node/7165362"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165364",
"url": "https://www.ibm.com/support/pages/node/7165364"
},
{
"published_at": "2024-08-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165363",
"url": "https://www.ibm.com/support/pages/node/7165363"
},
{
"published_at": "2024-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165488",
"url": "https://www.ibm.com/support/pages/node/7165488"
},
{
"published_at": "2024-08-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7165685",
"url": "https://www.ibm.com/support/pages/node/7165685"
}
]
}
CERTFR-2025-AVI-0356
Vulnerability from certfr_avis - Published: 2025-04-30 - Updated: 2025-04-30
De multiples vulnérabilités ont été découvertes dans les produits Splunk User Behavior Analytics (UBA). Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk User Behavior Analytics (UBA) | Splunk User Behavior Analytics (UBA) versions 5.4.x antérieures à 5.4.2 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk User Behavior Analytics (UBA) versions 5.4.x ant\u00e9rieures \u00e0 5.4.2",
"product": {
"name": "Splunk User Behavior Analytics (UBA)",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2025-04-30T00:00:00",
"last_revision_date": "2025-04-30T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0356",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-04-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk User Behavior Analytics (UBA). Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk User Behavior Analytics (UBA)",
"vendor_advisories": [
{
"published_at": "2025-04-29",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0418",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0418"
}
]
}
CERTFR-2024-AVI-0670
Vulnerability from certfr_avis - Published: 2024-08-13 - Updated: 2024-08-13
De multiples vulnérabilités ont été découvertes dans Splunk Machine Learning Toolkit. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Machine Learning Toolkit | Machine Learning Toolkit versions antérieures à 5.4.2 avec un version de Python for Scientific Computing antérieures à 4.2.1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Machine Learning Toolkit versions ant\u00e9rieures \u00e0 5.4.2 avec un version de Python for Scientific Computing ant\u00e9rieures \u00e0 4.2.1 ",
"product": {
"name": "Machine Learning Toolkit",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-31583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31583"
},
{
"name": "CVE-2022-25882",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25882"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3772"
},
{
"name": "CVE-2020-28975",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28975"
},
{
"name": "CVE-2024-3568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3568"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-7018",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7018"
},
{
"name": "CVE-2024-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34062"
},
{
"name": "CVE-2024-27319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27319"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-27318",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27318"
},
{
"name": "CVE-2022-45907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45907"
},
{
"name": "CVE-2020-28473",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28473"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-6730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6730"
},
{
"name": "CVE-2024-5206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5206"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-31580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31580"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2800"
},
{
"name": "CVE-2022-31799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-25399",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25399"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2024-08-13T00:00:00",
"last_revision_date": "2024-08-13T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0670",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Splunk Machine Learning Toolkit. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Splunk Machine Learning Toolkit",
"vendor_advisories": [
{
"published_at": "2024-08-12",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0801",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0801"
}
]
}
CERTFR-2024-AVI-0535
Vulnerability from certfr_avis - Published: 2024-07-02 - Updated: 2024-07-02
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.209 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.2 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.0.x antérieures à 9.0.10 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.5 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.2.x antérieures à 9.2.2 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.202 | ||
| Splunk | Universal Forwarder | Universal Forwarder sur Solaris versions 9.1.x antérieures à 9.1.5 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.209",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.0.x ant\u00e9rieures \u00e0 9.0.10",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.2.x ant\u00e9rieures \u00e0 9.2.2",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.202",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder sur Solaris versions 9.1.x ant\u00e9rieures \u00e0 9.1.5",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-40899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40899"
},
{
"name": "CVE-2024-36996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36996"
},
{
"name": "CVE-2021-29425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29425"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-36985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36985"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2024-36989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36989"
},
{
"name": "CVE-2023-34454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34454"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2024-36991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36991"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-34453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34453"
},
{
"name": "CVE-2024-36983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36983"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2024-36992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36992"
},
{
"name": "CVE-2024-36995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36995"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2024-36993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36993"
},
{
"name": "CVE-2023-34455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34455"
},
{
"name": "CVE-2024-36984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36984"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2018-10237",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10237"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-36994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36994"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-36987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36987"
},
{
"name": "CVE-2022-40896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40896"
},
{
"name": "CVE-2024-36986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36986"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-36997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36997"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-36990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36990"
}
],
"initial_release_date": "2024-07-02T00:00:00",
"last_revision_date": "2024-07-02T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0535",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-07-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0711",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0711"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0718",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0716",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0716"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0709",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0709"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0707",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0707"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0704",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0704"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0710",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0710"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0717",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0717"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0705",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0705"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0715",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0715"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0712",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0712"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0714",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0714"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0703",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0703"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0708",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0708"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0713",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0713"
},
{
"published_at": "2024-07-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-0706",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0706"
}
]
}
CERTFR-2026-AVI-0395
Vulnerability from certfr_avis - Published: 2026-04-03 - Updated: 2026-04-03
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.1.x sans le correctif de sécurité PH70422 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP15 IF01 | ||
| IBM | WebSphere Automation | WebSphere Automation versions antérieures à 1.12.0 | ||
| IBM | Storage Protect | Storage Protect Plus Server versions 10.1.x antérieures à 10.1.18 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere eXtreme Scale versions 8.6.1.x sans le correctif de s\u00e9curit\u00e9 PH70422",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP15 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Automation versions ant\u00e9rieures \u00e0 1.12.0",
"product": {
"name": "WebSphere Automation",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Storage Protect Plus Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.18",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2021-3200",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3200"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2026-27205",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27205"
},
{
"name": "CVE-2017-18342",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18342"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2019-20477",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20477"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-43898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43898"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2021-44568",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44568"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2021-33929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33929"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2024-5629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5629"
},
{
"name": "CVE-2021-28957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2021-33503",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33503"
},
{
"name": "CVE-2021-46877",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46877"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2021-33928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33928"
},
{
"name": "CVE-2022-48565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48565"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2018-18074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18074"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-27398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27398"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2019-11340",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11340"
},
{
"name": "CVE-2026-21860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21860"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-23672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2026-1188",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1188"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-27199",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27199"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-20916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20916"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2021-33930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33930"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2019-18874",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18874"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-20270",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20270"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2024-46759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46759"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2024-36880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36880"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2025-14847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14847"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2024-52317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52317"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2020-28493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28493"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2019-7548",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7548"
},
{
"name": "CVE-2020-14422",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14422"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2021-33938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33938"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2021-27291",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27291"
},
{
"name": "CVE-2019-7164",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7164"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
}
],
"initial_release_date": "2026-04-03T00:00:00",
"last_revision_date": "2026-04-03T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0395",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-04-03T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2026-03-31",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7268179",
"url": "https://www.ibm.com/support/pages/node/7268179"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267689",
"url": "https://www.ibm.com/support/pages/node/7267689"
},
{
"published_at": "2026-04-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7268331",
"url": "https://www.ibm.com/support/pages/node/7268331"
},
{
"published_at": "2026-03-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7267801",
"url": "https://www.ibm.com/support/pages/node/7267801"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: 2025-09-05 - Updated: 2025-09-05
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2024-AVI-0305
Vulnerability from certfr_avis - Published: 2024-04-12 - Updated: 2024-04-12
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Sterling Connect:Direct pour UNIX versions 6.1.0.x antérieures à 6.1.0.4.iFix104
- Sterling Connect:Direct pour UNIX versions 6.0.0.x antérieures à 6.0.0.2.iFix163
- Sterling Connect:Direct FTP+ versions antérieures à 1.3.0 sans le correctif de sécurité iFix026
- QRadar App SDK versions 2.2.x antérieures à 2.2.1
- QRadar Deployment Intelligence App versions antérieures à 3.0.13
- Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.20.0
- QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP8 IF01
- QRadar Suite Software versions 1.10.12.x antérieures à 1.10.20.0
- WebSphere Application Server Liberty versions postérieures à 21.0.0.2 et antérieures à 24.0.0.4
- WebSphere Application Server versions 9.x antérieures à 9.0.5.19
- WebSphere Application Server versions postérieures à 8.5.5.2 antérieures à 8.5.5.26
- Sterling B2B Integrator versions 6.0.x.x à 6.1.x.x antérieures à 6.1.2.5
- Sterling B2B Integrator versions 6.2.x.x antérieures à 6.2.0.1
Se référer aux bulletin de l'éditeur pour les versions des fichiers vulnérables (cf. section Documentation).
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.1.0.x ant\u00e9rieures \u00e0\u00a06.1.0.4.iFix104\u003c/li\u003e \u003cli\u003eSterling Connect:Direct pour UNIX versions 6.0.0.x ant\u00e9rieures \u00e0 6.0.0.2.iFix163\u003c/li\u003e \u003cli\u003eSterling Connect:Direct FTP+ versions ant\u00e9rieures \u00e0 1.3.0 sans le correctif de s\u00e9curit\u00e9 iFix026\u003c/li\u003e \u003cli\u003eQRadar App SDK versions 2.2.x ant\u00e9rieures \u00e0 2.2.1\u003c/li\u003e \u003cli\u003eQRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.13\u003c/li\u003e \u003cli\u003eCloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eQRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP8 IF01\u003c/li\u003e \u003cli\u003eQRadar Suite Software versions 1.10.12.x ant\u00e9rieures \u00e0 1.10.20.0\u003c/li\u003e \u003cli\u003eWebSphere Application Server Liberty versions post\u00e9rieures \u00e0 21.0.0.2 et ant\u00e9rieures \u00e0 24.0.0.4\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions 9.x ant\u00e9rieures \u00e0 9.0.5.19\u003c/li\u003e \u003cli\u003eWebSphere Application Server versions post\u00e9rieures \u00e0 8.5.5.2 ant\u00e9rieures \u00e0 8.5.5.26\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.0.x.x \u00e0 6.1.x.x ant\u00e9rieures \u00e0 6.1.2.5\u003c/li\u003e \u003cli\u003eSterling B2B Integrator versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.1\u003c/li\u003e \u003c/ul\u003e \u003cp\u003eSe r\u00e9f\u00e9rer aux bulletin de l\u0027\u00e9diteur pour les versions des fichiers vuln\u00e9rables (cf. section Documentation).\u003c/p\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2024-1597",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1597"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-22361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22361"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2012-0881",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0881"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-22696",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22696"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2022-46364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46364"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-46363",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46363"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-30468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30468"
},
{
"name": "CVE-2024-26130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26130"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2023-42794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42794"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2022-41721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41721"
},
{
"name": "CVE-2022-42920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42920"
},
{
"name": "CVE-2022-23437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23437"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2024-20932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20932"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2024-22234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22234"
}
],
"initial_release_date": "2024-04-12T00:00:00",
"last_revision_date": "2024-04-12T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0305",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un d\u00e9ni de service \u00e0 distance et une \u00e9l\u00e9vation de\nprivil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147813 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147813"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148062 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148062"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147943 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147943"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147903 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147903"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148094 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148094"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148151 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148151"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148066 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148066"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148158 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148158"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147727 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147727"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148065 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148065"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148068 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148068"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147728 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147728"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147944 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147944"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147726 du 08 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147726"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147923 du 10 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147923"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7147812 du 09 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7147812"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7148063 du 11 avril 2024",
"url": "https://www.ibm.com/support/pages/node/7148063"
}
]
}
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis - Published: 2025-07-11 - Updated: 2025-07-11
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2024-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7531"
},
{
"name": "CVE-2021-25317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25317"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2020-12413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12413"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2015-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1197"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2017-1000383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2025-52968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52968"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2023-7207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7207"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
}
],
"initial_release_date": "2025-07-11T00:00:00",
"last_revision_date": "2025-07-11T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35935",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35934",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35931",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931"
}
]
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
CERTFR-2024-AVI-0506
Vulnerability from certfr_avis - Published: 2024-06-19 - Updated: 2024-06-19
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP8 IF03 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP8 IF03",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-1382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1382"
},
{
"name": "CVE-2023-4732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4732"
},
{
"name": "CVE-2022-48564",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48564"
},
{
"name": "CVE-2019-15505",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15505"
},
{
"name": "CVE-2023-52448",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52448"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2023-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46813"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-40551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40551"
},
{
"name": "CVE-2022-45934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45934"
},
{
"name": "CVE-2023-28328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28328"
},
{
"name": "CVE-2023-51043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51043"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2023-5633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5633"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-45863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45863"
},
{
"name": "CVE-2022-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26691"
},
{
"name": "CVE-2023-6915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6915"
},
{
"name": "CVE-2023-5178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5178"
},
{
"name": "CVE-2024-26671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26671"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-6536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6536"
},
{
"name": "CVE-2023-37453",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37453"
},
{
"name": "CVE-2023-23455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23455"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2020-10001",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10001"
},
{
"name": "CVE-2024-0646",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0646"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2023-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40283"
},
{
"name": "CVE-2022-45884",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45884"
},
{
"name": "CVE-2023-52489",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52489"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-33951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33951"
},
{
"name": "CVE-2023-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2163"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2022-42895",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42895"
},
{
"name": "CVE-2023-4244",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4244"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2023-39193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39193"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2024-22243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22243"
},
{
"name": "CVE-2023-45862",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45862"
},
{
"name": "CVE-2023-1989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1989"
},
{
"name": "CVE-2020-3898",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3898"
},
{
"name": "CVE-2023-51779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51779"
},
{
"name": "CVE-2023-1855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1855"
},
{
"name": "CVE-2024-28784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28784"
},
{
"name": "CVE-2022-45869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45869"
},
{
"name": "CVE-2023-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2513"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-50961",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50961"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-52340",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52340"
},
{
"name": "CVE-2023-6817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6817"
},
{
"name": "CVE-2023-31084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31084"
},
{
"name": "CVE-2024-26609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26609"
},
{
"name": "CVE-2022-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45919"
},
{
"name": "CVE-2019-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13224"
},
{
"name": "CVE-2022-41858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41858"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2023-31436",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31436"
},
{
"name": "CVE-2001-1267",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1267"
},
{
"name": "CVE-2023-1074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1074"
},
{
"name": "CVE-2019-19204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19204"
},
{
"name": "CVE-2023-42753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42753"
},
{
"name": "CVE-2023-4921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4921"
},
{
"name": "CVE-2024-22262",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22262"
},
{
"name": "CVE-2023-33203",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33203"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-3812",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3812"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-39189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39189"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-27269",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27269"
},
{
"name": "CVE-2023-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38409"
},
{
"name": "CVE-2021-43975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43975"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2018-19787",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-6135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6135"
},
{
"name": "CVE-2023-6356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6356"
},
{
"name": "CVE-2023-39198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39198"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2023-1252",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1252"
},
{
"name": "CVE-2021-3753",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3753"
},
{
"name": "CVE-2022-3545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3545"
},
{
"name": "CVE-2020-28241",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28241"
},
{
"name": "CVE-2023-2176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2176"
},
{
"name": "CVE-2023-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2162"
},
{
"name": "CVE-2023-1079",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1079"
},
{
"name": "CVE-2022-36402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36402"
},
{
"name": "CVE-2023-33952",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33952"
},
{
"name": "CVE-2023-32324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32324"
},
{
"name": "CVE-2014-3146",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3146"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-3758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3758"
},
{
"name": "CVE-2023-3772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3772"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2022-4744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4744"
},
{
"name": "CVE-2023-40546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40546"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-3161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3161"
},
{
"name": "CVE-2023-28464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28464"
},
{
"name": "CVE-2023-3341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3341"
},
{
"name": "CVE-2023-3567",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3567"
},
{
"name": "CVE-2021-41043",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41043"
},
{
"name": "CVE-2023-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35824"
},
{
"name": "CVE-2023-45871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45871"
},
{
"name": "CVE-2023-1998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1998"
},
{
"name": "CVE-2023-28772",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28772"
},
{
"name": "CVE-2023-52580",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52580"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2019-16163",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16163"
},
{
"name": "CVE-2023-1786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1786"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2023-1075",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1075"
},
{
"name": "CVE-2023-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3609"
},
{
"name": "CVE-2023-4155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4155"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-35823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35823"
},
{
"name": "CVE-2023-52574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52574"
},
{
"name": "CVE-2022-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3565"
},
{
"name": "CVE-2023-31083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31083"
},
{
"name": "CVE-2023-26545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26545"
},
{
"name": "CVE-2022-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3640"
},
{
"name": "CVE-2023-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6176"
},
{
"name": "CVE-2022-45887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45887"
},
{
"name": "CVE-2023-6535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6535"
},
{
"name": "CVE-2023-25012",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25012"
},
{
"name": "CVE-2022-0500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0500"
},
{
"name": "CVE-2024-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0841"
},
{
"name": "CVE-2019-19203",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19203"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2020-25656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25656"
},
{
"name": "CVE-2022-48560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48560"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2022-3594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3594"
},
{
"name": "CVE-2023-51780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51780"
},
{
"name": "CVE-2023-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52434"
},
{
"name": "CVE-2023-34241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34241"
},
{
"name": "CVE-2022-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3094"
},
{
"name": "CVE-2024-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25742"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2023-4622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4622"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2024-26602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26602"
},
{
"name": "CVE-2023-3141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3141"
},
{
"name": "CVE-2021-4204",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4204"
},
{
"name": "CVE-2022-28388",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28388"
},
{
"name": "CVE-2023-30456",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30456"
},
{
"name": "CVE-2023-42465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42465"
},
{
"name": "CVE-2023-39192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39192"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-6606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6606"
},
{
"name": "CVE-2023-39194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39194"
},
{
"name": "CVE-2023-52620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52620"
},
{
"name": "CVE-2023-24023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24023"
},
{
"name": "CVE-2023-6932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6932"
},
{
"name": "CVE-2023-0458",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0458"
},
{
"name": "CVE-2023-1073",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1073"
},
{
"name": "CVE-2023-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3212"
},
{
"name": "CVE-2021-33631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33631"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2023-40549",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40549"
},
{
"name": "CVE-2023-1513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1513"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2011-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4969"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2023-40548",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40548"
},
{
"name": "CVE-2023-0597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0597"
},
{
"name": "CVE-2024-22259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22259"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2023-34966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34966"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-7192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7192"
},
{
"name": "CVE-2023-4132",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4132"
},
{
"name": "CVE-2022-26377",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26377"
},
{
"name": "CVE-2023-52581",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52581"
},
{
"name": "CVE-2023-40550",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40550"
},
{
"name": "CVE-2019-13631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13631"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2023-1206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1206"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2023-4623",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4623"
},
{
"name": "CVE-2023-51042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51042"
},
{
"name": "CVE-2023-42755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42755"
},
{
"name": "CVE-2023-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0590"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2023-50960",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50960"
},
{
"name": "CVE-2015-9251",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9251"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2023-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3268"
},
{
"name": "CVE-2023-25775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25775"
},
{
"name": "CVE-2012-6708",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6708"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2020-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7656"
},
{
"name": "CVE-2023-5717",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5717"
},
{
"name": "CVE-2019-19012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19012"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2023-6622",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6622"
},
{
"name": "CVE-2021-43818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43818"
},
{
"name": "CVE-2022-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23222"
},
{
"name": "CVE-2023-6121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6121"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2166"
},
{
"name": "CVE-2023-1192",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1192"
},
{
"name": "CVE-2023-40547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40547"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-42754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42754"
}
],
"initial_release_date": "2024-06-19T00:00:00",
"last_revision_date": "2024-06-19T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0506",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2024-06-19",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82681",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP8-IF03"
}
]
}
CERTFR-2024-AVI-0903
Vulnerability from certfr_avis - Published: 2024-10-18 - Updated: 2024-10-18
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | N/A | WebSphere Application Server Liberty versions 20.0.12 à 24.0.0.10 sans le correctif de sécurité PH63533 ou antérieures à 24.0.0.11 (disponibilité prévue pour le dernier trimestre 2024) | ||
| IBM | N/A | QRadar Incident Forensics versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Storage Protect Server versions 8.1.x antérieures à 8.1.24 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP10 | ||
| IBM | N/A | Robotic Process Automation versions 21.0..0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | Robotic Process Automation versions 23.0.x antérieures à 23.0.18 | ||
| IBM | N/A | Robotic Process Automation pour Cloud Pak versions 21.0.0.x antérieures à 21.0.7.18 | ||
| IBM | N/A | QRadar Network Capture versions 7.5.x antérieures à 7.5.0 Update Package 10 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "WebSphere Application Server Liberty versions 20.0.12 \u00e0 24.0.0.10 sans le correctif de s\u00e9curit\u00e9 PH63533 ou ant\u00e9rieures \u00e0 24.0.0.11 (disponibilit\u00e9 pr\u00e9vue pour le dernier trimestre 2024)",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Storage Protect Server versions 8.1.x ant\u00e9rieures \u00e0 8.1.24",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 21.0..0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation versions 23.0.x ant\u00e9rieures \u00e0 23.0.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Robotic Process Automation pour Cloud Pak versions 21.0.0.x ant\u00e9rieures \u00e0 21.0.7.18",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Network Capture versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 Update Package 10",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2023-25577",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25577"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-20592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20592"
},
{
"name": "CVE-2018-1311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1311"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2020-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25219"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2023-23934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23934"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2024-31881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31881"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2022-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38725"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-31880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31880"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2024-28762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28762"
},
{
"name": "CVE-2021-45429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45429"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2020-7212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7212"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-28786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28786"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2023-46136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46136"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2023-29267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29267"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-46329",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46329"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2020-26154",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26154"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2023-30861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30861"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2024-28752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28752"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"initial_release_date": "2024-10-18T00:00:00",
"last_revision_date": "2024-10-18T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0903",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173421",
"url": "https://www.ibm.com/support/pages/node/7173421"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173043",
"url": "https://www.ibm.com/support/pages/node/7173043"
},
{
"published_at": "2024-10-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173420",
"url": "https://www.ibm.com/support/pages/node/7173420"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173226",
"url": "https://www.ibm.com/support/pages/node/7173226"
},
{
"published_at": "2024-10-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173224",
"url": "https://www.ibm.com/support/pages/node/7173224"
},
{
"published_at": "2024-10-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7173097",
"url": "https://www.ibm.com/support/pages/node/7173097"
}
]
}
CERTFR-2026-AVI-0326
Vulnerability from certfr_avis - Published: 2026-03-20 - Updated: 2026-03-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.6 | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.6.9 | ||
| VMware | N/A | Python Buildpack versions antérieures à 1.8.83 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.1.9 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ sur Tanzu Platform versions antérieures à 2.4.4 | ||
| VMware | N/A | PHP Buildpack versions antérieures à 4.6.69 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 3.2.5 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.17 | ||
| VMware | Tanzu Platform | Tanzu RabbitMQ pour Tanzu Platform versions antérieures à 10.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 2.4.6 | ||
| VMware | Tanzu Platform | Tanzu Platform versions antérieures à 1.16.18 | ||
| VMware | Tanzu Platform | Tanzu for Valkey sur Tanzu Platform versions antérieures à 10.2.2 | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 6.0.26+LTS-T | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.9+LTS-T | ||
| VMware | Tanzu Platform | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.3.6 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.83",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ sur Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.69",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.5",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.17",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu RabbitMQ pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.18",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for Valkey sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.2",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.26+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.9+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.6",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-28422",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28422"
},
{
"name": "CVE-2024-36903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36903"
},
{
"name": "CVE-2024-35875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35875"
},
{
"name": "CVE-2022-50759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50759"
},
{
"name": "CVE-2026-26007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26007"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2024-49912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49912"
},
{
"name": "CVE-2024-36026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36026"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2023-3640",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3640"
},
{
"name": "CVE-2024-27435",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27435"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2024-42122",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42122"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-28420",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28420"
},
{
"name": "CVE-2022-49069",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49069"
},
{
"name": "CVE-2024-57875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57875"
},
{
"name": "CVE-2022-27943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27943"
},
{
"name": "CVE-2025-40064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40064"
},
{
"name": "CVE-2023-54129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54129"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2025-39992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39992"
},
{
"name": "CVE-2025-69534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69534"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2022-49543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49543"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2023-53562",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53562"
},
{
"name": "CVE-2025-68324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68324"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2024-50063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50063"
},
{
"name": "CVE-2023-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33875"
},
{
"name": "CVE-2024-41001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41001"
},
{
"name": "CVE-2024-42155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42155"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-36353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36353"
},
{
"name": "CVE-2025-68196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68196"
},
{
"name": "CVE-2024-46770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46770"
},
{
"name": "CVE-2023-53247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53247"
},
{
"name": "CVE-2025-38042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38042"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-53829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53829"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-54002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54002"
},
{
"name": "CVE-2022-50550",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50550"
},
{
"name": "CVE-2022-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0400"
},
{
"name": "CVE-2022-49138",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49138"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2022-49359",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49359"
},
{
"name": "CVE-2025-68342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68342"
},
{
"name": "CVE-2022-48673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48673"
},
{
"name": "CVE-2022-50425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50425"
},
{
"name": "CVE-2025-38201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38201"
},
{
"name": "CVE-2024-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39293"
},
{
"name": "CVE-2023-53008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53008"
},
{
"name": "CVE-2025-38669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38669"
},
{
"name": "CVE-2025-40137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40137"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-22107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22107"
},
{
"name": "CVE-2024-38306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38306"
},
{
"name": "CVE-2023-53733",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53733"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2023-1386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1386"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-56703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56703"
},
{
"name": "CVE-2026-23098",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23098"
},
{
"name": "CVE-2023-53347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53347"
},
{
"name": "CVE-2023-28374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28374"
},
{
"name": "CVE-2023-52926",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52926"
},
{
"name": "CVE-2026-32597",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32597"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2024-36921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36921"
},
{
"name": "CVE-2025-40057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40057"
},
{
"name": "CVE-2024-41050",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41050"
},
{
"name": "CVE-2026-25500",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25500"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-27558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27558"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2026-21637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21637"
},
{
"name": "CVE-2024-35998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35998"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2021-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0076"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2024-58237",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58237"
},
{
"name": "CVE-2024-36909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36909"
},
{
"name": "CVE-2024-42147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42147"
},
{
"name": "CVE-2023-53529",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53529"
},
{
"name": "CVE-2024-50028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50028"
},
{
"name": "CVE-2023-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53042"
},
{
"name": "CVE-2022-50527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50527"
},
{
"name": "CVE-2023-54280",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54280"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-58094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58094"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2025-52534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52534"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2024-46705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46705"
},
{
"name": "CVE-2022-50407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50407"
},
{
"name": "CVE-2026-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23196"
},
{
"name": "CVE-2024-26595",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26595"
},
{
"name": "CVE-2022-23825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23825"
},
{
"name": "CVE-2024-45775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45775"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2022-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49901"
},
{
"name": "CVE-2026-23126",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23126"
},
{
"name": "CVE-2025-38329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38329"
},
{
"name": "CVE-2021-33096",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33096"
},
{
"name": "CVE-2022-50230",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50230"
},
{
"name": "CVE-2024-35949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35949"
},
{
"name": "CVE-2025-39947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39947"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53588"
},
{
"name": "CVE-2024-41082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41082"
},
{
"name": "CVE-2023-53685",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53685"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-37870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37870"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2022-49533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49533"
},
{
"name": "CVE-2024-42253",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42253"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2021-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33114"
},
{
"name": "CVE-2025-69645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69645"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2022-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49125"
},
{
"name": "CVE-2024-36900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36900"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2024-26866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26866"
},
{
"name": "CVE-2024-27010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27010"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2023-52561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52561"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53221"
},
{
"name": "CVE-2024-41069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41069"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-47432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47432"
},
{
"name": "CVE-2026-24734",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24734"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2024-35878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35878"
},
{
"name": "CVE-2023-53362",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53362"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2024-26756",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26756"
},
{
"name": "CVE-2022-50815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50815"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-39826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39826"
},
{
"name": "CVE-2025-38036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38036"
},
{
"name": "CVE-2025-2668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2668"
},
{
"name": "CVE-2025-71221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71221"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2024-46860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46860"
},
{
"name": "CVE-2025-22040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22040"
},
{
"name": "CVE-2024-53095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53095"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2022-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38457"
},
{
"name": "CVE-2024-56665",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56665"
},
{
"name": "CVE-2025-38340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38340"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-53629",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53629"
},
{
"name": "CVE-2022-50178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50178"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-37880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37880"
},
{
"name": "CVE-2025-36427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36427"
},
{
"name": "CVE-2026-23217",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23217"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-37833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37833"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2025-68246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68246"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2023-53320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53320"
},
{
"name": "CVE-2024-44961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44961"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2025-21656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21656"
},
{
"name": "CVE-2024-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46835"
},
{
"name": "CVE-2025-69650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69650"
},
{
"name": "CVE-2022-50554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50554"
},
{
"name": "CVE-2023-53509",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53509"
},
{
"name": "CVE-2023-53421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53421"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2024-46775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46775"
},
{
"name": "CVE-2025-39764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39764"
},
{
"name": "CVE-2025-38207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38207"
},
{
"name": "CVE-2022-49465",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49465"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2024-26807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26807"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2022-49742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49742"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2025-68364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68364"
},
{
"name": "CVE-2024-42118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42118"
},
{
"name": "CVE-2025-40100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40100"
},
{
"name": "CVE-2026-1965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1965"
},
{
"name": "CVE-2024-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52560"
},
{
"name": "CVE-2024-56604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56604"
},
{
"name": "CVE-2026-23227",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23227"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-52653",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52653"
},
{
"name": "CVE-2025-40285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40285"
},
{
"name": "CVE-2023-52508",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52508"
},
{
"name": "CVE-2025-69647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69647"
},
{
"name": "CVE-2025-39827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39827"
},
{
"name": "CVE-2024-50014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50014"
},
{
"name": "CVE-2022-49108",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49108"
},
{
"name": "CVE-2024-56677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56677"
},
{
"name": "CVE-2025-38717",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38717"
},
{
"name": "CVE-2026-3497",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3497"
},
{
"name": "CVE-2025-22019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22019"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-40208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40208"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2024-26767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26767"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2026-2219",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2219"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40039"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2024-35926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35926"
},
{
"name": "CVE-2024-27389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27389"
},
{
"name": "CVE-2024-26983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26983"
},
{
"name": "CVE-2022-50627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50627"
},
{
"name": "CVE-2024-50285",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50285"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38029"
},
{
"name": "CVE-2022-49123",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49123"
},
{
"name": "CVE-2024-50289",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50289"
},
{
"name": "CVE-2023-53258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53258"
},
{
"name": "CVE-2024-46813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46813"
},
{
"name": "CVE-2024-38594",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38594"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47658"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2025-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38096"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-53429",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53429"
},
{
"name": "CVE-2024-46765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46765"
},
{
"name": "CVE-2022-50380",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50380"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2022-48990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48990"
},
{
"name": "CVE-2024-24864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24864"
},
{
"name": "CVE-2024-35832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35832"
},
{
"name": "CVE-2024-36479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36479"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2026-23220",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23220"
},
{
"name": "CVE-2024-45782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45782"
},
{
"name": "CVE-2022-50785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50785"
},
{
"name": "CVE-2025-39745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39745"
},
{
"name": "CVE-2024-35799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35799"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2026-23020",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23020"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2025-71223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71223"
},
{
"name": "CVE-2025-36098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36098"
},
{
"name": "CVE-2025-68796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68796"
},
{
"name": "CVE-2025-40016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40016"
},
{
"name": "CVE-2023-53765",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53765"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40356",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40356"
},
{
"name": "CVE-2026-1642",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1642"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2023-53325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53325"
},
{
"name": "CVE-2025-21752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21752"
},
{
"name": "CVE-2026-27138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27138"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-68220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68220"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-39282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39282"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2025-68302",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68302"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2024-40975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40975"
},
{
"name": "CVE-2025-68175",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68175"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2023-46316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46316"
},
{
"name": "CVE-2024-47866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47866"
},
{
"name": "CVE-2024-44970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44970"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2025-39925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39925"
},
{
"name": "CVE-2025-68769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68769"
},
{
"name": "CVE-2024-50286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50286"
},
{
"name": "CVE-2025-40139",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40139"
},
{
"name": "CVE-2025-68794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68794"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2022-48667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48667"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2024-56744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56744"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2026-3783",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3783"
},
{
"name": "CVE-2022-49161",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49161"
},
{
"name": "CVE-2021-21240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21240"
},
{
"name": "CVE-2022-48771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48771"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23131"
},
{
"name": "CVE-2024-27400",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27400"
},
{
"name": "CVE-2023-52485",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52485"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2022-49997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49997"
},
{
"name": "CVE-2022-49469",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49469"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-68334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68334"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2022-0480",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0480"
},
{
"name": "CVE-2025-68173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68173"
},
{
"name": "CVE-2024-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49932"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-53209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53209"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2025-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22103"
},
{
"name": "CVE-2025-1272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1272"
},
{
"name": "CVE-2025-21658",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21658"
},
{
"name": "CVE-2022-49651",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49651"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2024-26770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26770"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2024-27041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27041"
},
{
"name": "CVE-2025-36184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36184"
},
{
"name": "CVE-2026-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3195"
},
{
"name": "CVE-2025-37743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37743"
},
{
"name": "CVE-2025-40005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40005"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-26242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26242"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-52673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52673"
},
{
"name": "CVE-2024-56722",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56722"
},
{
"name": "CVE-2021-33113",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33113"
},
{
"name": "CVE-2022-48668",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48668"
},
{
"name": "CVE-2024-27418",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27418"
},
{
"name": "CVE-2025-68231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68231"
},
{
"name": "CVE-2021-22930",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22930"
},
{
"name": "CVE-2025-14177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14177"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-38591",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38591"
},
{
"name": "CVE-2025-68806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68806"
},
{
"name": "CVE-2022-50322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50322"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-27635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27635"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2024-49922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49922"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2024-42128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42128"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2024-49909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49909"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2021-42771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-42771"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2021-4095",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4095"
},
{
"name": "CVE-2022-50240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50240"
},
{
"name": "CVE-2025-40054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40054"
},
{
"name": "CVE-2024-45015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45015"
},
{
"name": "CVE-2025-68184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68184"
},
{
"name": "CVE-2024-36357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36357"
},
{
"name": "CVE-2025-71074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71074"
},
{
"name": "CVE-2025-38673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38673"
},
{
"name": "CVE-2025-40107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40107"
},
{
"name": "CVE-2025-11234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11234"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-53447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53447"
},
{
"name": "CVE-2024-46754",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46754"
},
{
"name": "CVE-2021-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0161"
},
{
"name": "CVE-2018-1121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1121"
},
{
"name": "CVE-2022-49547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49547"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2025-0622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0622"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2024-26757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26757"
},
{
"name": "CVE-2024-49899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49899"
},
{
"name": "CVE-2022-49484",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49484"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2026-27137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27137"
},
{
"name": "CVE-2023-53248",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53248"
},
{
"name": "CVE-2024-56788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56788"
},
{
"name": "CVE-2016-8660",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-8660"
},
{
"name": "CVE-2024-26691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26691"
},
{
"name": "CVE-2026-23047",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23047"
},
{
"name": "CVE-2025-22121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22121"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2025-7519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7519"
},
{
"name": "CVE-2023-53491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53491"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-49908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49908"
},
{
"name": "CVE-2025-68265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68265"
},
{
"name": "CVE-2024-50048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50048"
},
{
"name": "CVE-2026-28421",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28421"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2026-27171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27171"
},
{
"name": "CVE-2022-50811",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50811"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2023-4133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4133"
},
{
"name": "CVE-2024-50183",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50183"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2023-53366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53366"
},
{
"name": "CVE-2022-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49910"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2022-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49203"
},
{
"name": "CVE-2024-40918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40918"
},
{
"name": "CVE-2024-27032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27032"
},
{
"name": "CVE-2022-50236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50236"
},
{
"name": "CVE-2024-35932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35932"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2025-68344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68344"
},
{
"name": "CVE-2026-23137",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23137"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2025-37882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37882"
},
{
"name": "CVE-2024-35971",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35971"
},
{
"name": "CVE-2024-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46762"
},
{
"name": "CVE-2023-34983",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34983"
},
{
"name": "CVE-2024-35868",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35868"
},
{
"name": "CVE-2023-53323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53323"
},
{
"name": "CVE-2026-3731",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3731"
},
{
"name": "CVE-2025-40198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40198"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2025-39942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39942"
},
{
"name": "CVE-2025-68310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68310"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68229"
},
{
"name": "CVE-2023-52857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52857"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-39929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39929"
},
{
"name": "CVE-2022-50304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50304"
},
{
"name": "CVE-2026-23226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23226"
},
{
"name": "CVE-2020-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26146"
},
{
"name": "CVE-2024-43844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43844"
},
{
"name": "CVE-2023-52920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52920"
},
{
"name": "CVE-2023-52590",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52590"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2024-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22025"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-68321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68321"
},
{
"name": "CVE-2021-0072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0072"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2025-69652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69652"
},
{
"name": "CVE-2025-21635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21635"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2022-40133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40133"
},
{
"name": "CVE-2020-26143",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26143"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38353"
},
{
"name": "CVE-2025-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36009"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2023-52761",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52761"
},
{
"name": "CVE-2022-49773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49773"
},
{
"name": "CVE-2023-53609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53609"
},
{
"name": "CVE-2023-53478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53478"
},
{
"name": "CVE-2024-42117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42117"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2023-53682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53682"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2026-3442",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3442"
},
{
"name": "CVE-2024-58238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58238"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2025-22039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22039"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39933"
},
{
"name": "CVE-2025-40237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40237"
},
{
"name": "CVE-2022-49722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49722"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-68780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68780"
},
{
"name": "CVE-2024-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35945"
},
{
"name": "CVE-2025-39990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39990"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-53780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53780"
},
{
"name": "CVE-2020-35501",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35501"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2023-52624",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52624"
},
{
"name": "CVE-2024-56557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56557"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-50700",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50700"
},
{
"name": "CVE-2023-52632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52632"
},
{
"name": "CVE-2024-46836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46836"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2024-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38556"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2025-55130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55130"
},
{
"name": "CVE-2025-36070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36070"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2025-38105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38105"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2023-53198",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53198"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2025-71121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71121"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2025-40333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40333"
},
{
"name": "CVE-2022-50234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50234"
},
{
"name": "CVE-2025-38082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38082"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-49934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49934"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38022"
},
{
"name": "CVE-2026-23066",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23066"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2023-4969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4969"
},
{
"name": "CVE-2024-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50098"
},
{
"name": "CVE-2024-35946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35946"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-53789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53789"
},
{
"name": "CVE-2022-49858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49858"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-36428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36428"
},
{
"name": "CVE-2023-53520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53520"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2023-52737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52737"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2024-35803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35803"
},
{
"name": "CVE-2025-22105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22105"
},
{
"name": "CVE-2024-8612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8612"
},
{
"name": "CVE-2023-52586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52586"
},
{
"name": "CVE-2025-40332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40332"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2021-33110",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33110"
},
{
"name": "CVE-2025-37834",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37834"
},
{
"name": "CVE-2025-21833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21833"
},
{
"name": "CVE-2025-40082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40082"
},
{
"name": "CVE-2019-19378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19378"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2024-40972",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40972"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2025-71073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71073"
},
{
"name": "CVE-2025-38426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38426"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2024-36911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36911"
},
{
"name": "CVE-2025-55131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55131"
},
{
"name": "CVE-2025-40104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40104"
},
{
"name": "CVE-2024-36917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36917"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2026-23236",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23236"
},
{
"name": "CVE-2023-53068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53068"
},
{
"name": "CVE-2025-22090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22090"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2021-31615",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31615"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2022-49932",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49932"
},
{
"name": "CVE-2022-25837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25837"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2024-49939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49939"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2024-49905",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49905"
},
{
"name": "CVE-2023-52831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52831"
},
{
"name": "CVE-2023-53221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53221"
},
{
"name": "CVE-2024-26719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26719"
},
{
"name": "CVE-2022-44034",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44034"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53072"
},
{
"name": "CVE-2023-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2007"
},
{
"name": "CVE-2022-37341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37341"
},
{
"name": "CVE-2025-69648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69648"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50298"
},
{
"name": "CVE-2025-36424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36424"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2024-46843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46843"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-36387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36387"
},
{
"name": "CVE-2025-38709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38709"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4408"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-53602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53602"
},
{
"name": "CVE-2023-2828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2828"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2023-53867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53867"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2025-37926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37926"
},
{
"name": "CVE-2024-46715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46715"
},
{
"name": "CVE-2025-38038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38038"
},
{
"name": "CVE-2024-46802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46802"
},
{
"name": "CVE-2025-39859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39859"
},
{
"name": "CVE-2025-40313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40313"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2023-33053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33053"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2026-24051",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24051"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2025-38261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38261"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2025-69644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69644"
},
{
"name": "CVE-2022-49303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49303"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2023-46809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46809"
},
{
"name": "CVE-2025-59465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59465"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2024-42320",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42320"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2024-53234",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53234"
},
{
"name": "CVE-2025-11961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11961"
},
{
"name": "CVE-2025-39877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39877"
},
{
"name": "CVE-2022-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3114"
},
{
"name": "CVE-2023-52916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52916"
},
{
"name": "CVE-2025-38064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38064"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2024-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35937"
},
{
"name": "CVE-2022-50628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50628"
},
{
"name": "CVE-2024-56718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56718"
},
{
"name": "CVE-2024-43824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43824"
},
{
"name": "CVE-2025-39886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39886"
},
{
"name": "CVE-2022-50350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50350"
},
{
"name": "CVE-2025-21831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21831"
},
{
"name": "CVE-2022-50721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50721"
},
{
"name": "CVE-2022-50095",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50095"
},
{
"name": "CVE-2025-40073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40073"
},
{
"name": "CVE-2024-26662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26662"
},
{
"name": "CVE-2026-3196",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3196"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2024-50217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50217"
},
{
"name": "CVE-2021-0168",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0168"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2022-50479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50479"
},
{
"name": "CVE-2022-50583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50583"
},
{
"name": "CVE-2025-37806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37806"
},
{
"name": "CVE-2024-38554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38554"
},
{
"name": "CVE-2025-68822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68822"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2023-0030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0030"
},
{
"name": "CVE-2024-42110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42110"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-39838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39838"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2024-53179",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53179"
},
{
"name": "CVE-2024-57945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57945"
},
{
"name": "CVE-2023-54233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54233"
},
{
"name": "CVE-2024-43899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43899"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2019-15213",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15213"
},
{
"name": "CVE-2025-38234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38234"
},
{
"name": "CVE-2022-49935",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49935"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2022-49534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49534"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-50012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50012"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-53010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53010"
},
{
"name": "CVE-2024-35956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35956"
},
{
"name": "CVE-2024-57888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57888"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2023-54237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54237"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2023-53424",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53424"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2022-49134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49134"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2022-49333",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49333"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-27111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27111"
},
{
"name": "CVE-2024-49994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49994"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2019-19814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19814"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2024-36898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36898"
},
{
"name": "CVE-2024-44962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44962"
},
{
"name": "CVE-2025-68322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68322"
},
{
"name": "CVE-2024-35931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35931"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2026-22980",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22980"
},
{
"name": "CVE-2026-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23138"
},
{
"name": "CVE-2025-39927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39927"
},
{
"name": "CVE-2026-1703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1703"
},
{
"name": "CVE-2023-26551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26551"
},
{
"name": "CVE-2024-46857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46857"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2024-53210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53210"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2022-49342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49342"
},
{
"name": "CVE-2015-8553",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8553"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2024-36966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36966"
},
{
"name": "CVE-2023-53332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53332"
},
{
"name": "CVE-2024-35924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35924"
},
{
"name": "CVE-2024-58095",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58095"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2022-49471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49471"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2025-21751",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21751"
},
{
"name": "CVE-2023-53753",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53753"
},
{
"name": "CVE-2024-41074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41074"
},
{
"name": "CVE-2026-23234",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23234"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2024-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50106"
},
{
"name": "CVE-2025-23162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23162"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2017-13694",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13694"
},
{
"name": "CVE-2025-71102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71102"
},
{
"name": "CVE-2026-23212",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23212"
},
{
"name": "CVE-2013-7445",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7445"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2023-52701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52701"
},
{
"name": "CVE-2024-49906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49906"
},
{
"name": "CVE-2024-26647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26647"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2024-47809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47809"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2022-49317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49317"
},
{
"name": "CVE-2026-23019",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23019"
},
{
"name": "CVE-2018-12928",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12928"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-56607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56607"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2026-27142",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27142"
},
{
"name": "CVE-2024-49904",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49904"
},
{
"name": "CVE-2023-53671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53671"
},
{
"name": "CVE-2025-40354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40354"
},
{
"name": "CVE-2024-26938",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26938"
},
{
"name": "CVE-2026-28417",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28417"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2024-35999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35999"
},
{
"name": "CVE-2023-29942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29942"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2022-48633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48633"
},
{
"name": "CVE-2022-3238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3238"
},
{
"name": "CVE-2024-38557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38557"
},
{
"name": "CVE-2026-22185",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22185"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2023-53584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53584"
},
{
"name": "CVE-2024-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57809"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2024-56719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56719"
},
{
"name": "CVE-2022-50418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50418"
},
{
"name": "CVE-2023-53438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53438"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2023-53460",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53460"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2024-56671",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56671"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2025-62626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62626"
},
{
"name": "CVE-2025-39940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39940"
},
{
"name": "CVE-2023-52751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52751"
},
{
"name": "CVE-2022-49562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49562"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2023-53483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53483"
},
{
"name": "CVE-2023-53673",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53673"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-37746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37746"
},
{
"name": "CVE-2022-38076",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38076"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2024-56368",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56368"
},
{
"name": "CVE-2025-40075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40075"
},
{
"name": "CVE-2022-49172",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49172"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2024-40979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40979"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2026-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23240"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2026-23228",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23228"
},
{
"name": "CVE-2024-49945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49945"
},
{
"name": "CVE-2022-44033",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44033"
},
{
"name": "CVE-2024-56757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56757"
},
{
"name": "CVE-2023-53662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53662"
},
{
"name": "CVE-2025-38069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38069"
},
{
"name": "CVE-2022-49750",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49750"
},
{
"name": "CVE-2023-53707",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53707"
},
{
"name": "CVE-2023-53115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53115"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2023-54107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54107"
},
{
"name": "CVE-2022-48646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48646"
},
{
"name": "CVE-2024-43912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43912"
},
{
"name": "CVE-2024-35808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35808"
},
{
"name": "CVE-2024-58012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58012"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-68772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68772"
},
{
"name": "CVE-2024-49891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49891"
},
{
"name": "CVE-2024-36948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36948"
},
{
"name": "CVE-2022-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48887"
},
{
"name": "CVE-2024-40977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40977"
},
{
"name": "CVE-2024-26948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26948"
},
{
"name": "CVE-2023-53370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53370"
},
{
"name": "CVE-2024-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53187"
},
{
"name": "CVE-2023-45929",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45929"
},
{
"name": "CVE-2025-68343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68343"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2024-57795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57795"
},
{
"name": "CVE-2025-37855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37855"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2021-33115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33115"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2020-26140",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26140"
},
{
"name": "CVE-2024-39508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39508"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-32249",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-32249"
},
{
"name": "CVE-2025-37899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37899"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-40362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40362"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2024-43831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43831"
},
{
"name": "CVE-2023-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30630"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-38330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38330"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2017-13693",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13693"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2024-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50284"
},
{
"name": "CVE-2022-49306",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49306"
},
{
"name": "CVE-2024-49898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49898"
},
{
"name": "CVE-2025-36423",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36423"
},
{
"name": "CVE-2022-49622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49622"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2024-50211",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50211"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2022-50284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50284"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22028"
},
{
"name": "CVE-2024-41008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41008"
},
{
"name": "CVE-2024-27035",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27035"
},
{
"name": "CVE-2023-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53218"
},
{
"name": "CVE-2022-25836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25836"
},
{
"name": "CVE-2024-37354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37354"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-29934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29934"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2022-49133",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49133"
},
{
"name": "CVE-2024-36951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36951"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2025-38438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38438"
},
{
"name": "CVE-2025-40032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40032"
},
{
"name": "CVE-2023-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26555"
},
{
"name": "CVE-2023-1193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1193"
},
{
"name": "CVE-2025-71220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71220"
},
{
"name": "CVE-2024-46806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46806"
},
{
"name": "CVE-2022-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50073"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2026-23103",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23103"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-68786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68786"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2022-50393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50393"
},
{
"name": "CVE-2025-68779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68779"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-21819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21819"
},
{
"name": "CVE-2025-48514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48514"
},
{
"name": "CVE-2024-41030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41030"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2024-47664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47664"
},
{
"name": "CVE-2024-36915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36915"
},
{
"name": "CVE-2026-25749",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25749"
},
{
"name": "CVE-2024-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49504"
},
{
"name": "CVE-2025-38118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53367"
},
{
"name": "CVE-2022-50500",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50500"
},
{
"name": "CVE-2019-14899",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14899"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2024-53098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53098"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2024-49968",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49968"
},
{
"name": "CVE-2025-68358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68358"
},
{
"name": "CVE-2025-40206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40206"
},
{
"name": "CVE-2026-23180",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23180"
},
{
"name": "CVE-2021-0164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0164"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2024-46870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46870"
},
{
"name": "CVE-2022-49178",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49178"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2024-49929",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49929"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2023-53748",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53748"
},
{
"name": "CVE-2024-26740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26740"
},
{
"name": "CVE-2022-49173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49173"
},
{
"name": "CVE-2024-45781",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45781"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2024-53056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53056"
},
{
"name": "CVE-2022-50551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50551"
},
{
"name": "CVE-2026-26269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26269"
},
{
"name": "CVE-2024-43872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43872"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2025-71069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71069"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2023-52939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52939"
},
{
"name": "CVE-2024-14027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-14027"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-69649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69649"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2024-49859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49859"
},
{
"name": "CVE-2025-40336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40336"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2022-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49766"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-22043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22043"
},
{
"name": "CVE-2024-49569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49569"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2023-52569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52569"
},
{
"name": "CVE-2024-56609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56609"
},
{
"name": "CVE-2022-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49940"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2024-56611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56611"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2020-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25743"
},
{
"name": "CVE-2022-50167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50167"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2026-27704",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27704"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2023-45896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45896"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2025-68774",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68774"
},
{
"name": "CVE-2024-49940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49940"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2021-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3735"
},
{
"name": "CVE-2025-40353",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40353"
},
{
"name": "CVE-2024-46861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46861"
},
{
"name": "CVE-2025-40222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40222"
},
{
"name": "CVE-2022-50634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50634"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-54514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54514"
},
{
"name": "CVE-2025-71202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71202"
},
{
"name": "CVE-2015-7837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7837"
},
{
"name": "CVE-2025-0677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0677"
},
{
"name": "CVE-2024-45780",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45780"
},
{
"name": "CVE-2024-46749",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46749"
},
{
"name": "CVE-2022-50492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50492"
},
{
"name": "CVE-2024-49888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49888"
},
{
"name": "CVE-2022-50406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50406"
},
{
"name": "CVE-2023-26552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26552"
},
{
"name": "CVE-2024-49921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49921"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-71180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71180"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-59691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59691"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2023-52481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52481"
},
{
"name": "CVE-2023-52888",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52888"
},
{
"name": "CVE-2025-22057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22057"
},
{
"name": "CVE-2024-47666",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47666"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2023-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0160"
},
{
"name": "CVE-2024-50056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50056"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2026-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1788"
},
{
"name": "CVE-2023-53721",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53721"
},
{
"name": "CVE-2025-22113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22113"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2022-50256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50256"
},
{
"name": "CVE-2024-42091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42091"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2025-37907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37907"
},
{
"name": "CVE-2024-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38625"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2023-4010",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4010"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2024-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46727"
},
{
"name": "CVE-2023-54028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54028"
},
{
"name": "CVE-2024-42129",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42129"
},
{
"name": "CVE-2023-54105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54105"
},
{
"name": "CVE-2018-17977",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17977"
},
{
"name": "CVE-2019-1010204",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010204"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-26960",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26960"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2022-50354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50354"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12801"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2024-41079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41079"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2024-43823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43823"
},
{
"name": "CVE-2023-52589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52589"
},
{
"name": "CVE-2022-41848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41848"
},
{
"name": "CVE-2026-23216",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23216"
},
{
"name": "CVE-2023-53434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53434"
},
{
"name": "CVE-2023-29935",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29935"
},
{
"name": "CVE-2023-35061",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35061"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2026-21636",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21636"
},
{
"name": "CVE-2026-23239",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23239"
},
{
"name": "CVE-2021-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0172"
},
{
"name": "CVE-2024-47662",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47662"
},
{
"name": "CVE-2018-12930",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12930"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2024-49970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49970"
},
{
"name": "CVE-2024-41067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41067"
},
{
"name": "CVE-2024-26844",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26844"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2025-40193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40193"
},
{
"name": "CVE-2023-32644",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32644"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2024-46681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46681"
},
{
"name": "CVE-2024-36927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36927"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-40012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40012"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2023-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53178"
},
{
"name": "CVE-2024-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47141"
},
{
"name": "CVE-2024-8354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8354"
},
{
"name": "CVE-2023-54323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54323"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2025-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0689"
},
{
"name": "CVE-2022-50316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50316"
},
{
"name": "CVE-2023-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31347"
},
{
"name": "CVE-2025-40084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40084"
},
{
"name": "CVE-2025-22111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22111"
},
{
"name": "CVE-2023-53657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53657"
},
{
"name": "CVE-2024-49915",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49915"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2025-55132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55132"
},
{
"name": "CVE-2023-52732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52732"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2022-49167",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49167"
},
{
"name": "CVE-2025-68311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68311"
},
{
"name": "CVE-2026-27903",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27903"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2024-41088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41088"
},
{
"name": "CVE-2025-0690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0690"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2023-53052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53052"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2022-49234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49234"
},
{
"name": "CVE-2022-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50163"
},
{
"name": "CVE-2024-36922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36922"
},
{
"name": "CVE-2025-71067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71067"
},
{
"name": "CVE-2024-49919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49919"
},
{
"name": "CVE-2026-23238",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23238"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2025-40341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40341"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-26699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26699"
},
{
"name": "CVE-2024-57876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57876"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2026-25679",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25679"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2022-50390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50390"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-71186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71186"
},
{
"name": "CVE-2024-53220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53220"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2023-53539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53539"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2025-68821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68821"
},
{
"name": "CVE-2025-31648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31648"
},
{
"name": "CVE-2025-0678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0678"
},
{
"name": "CVE-2024-41075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41075"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2024-56674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56674"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2025-40195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40195"
},
{
"name": "CVE-2024-31884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31884"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2019-1563",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1563"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2023-53574",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53574"
},
{
"name": "CVE-2022-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50166"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2024-56738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56738"
},
{
"name": "CVE-2022-50778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50778"
},
{
"name": "CVE-2024-42067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42067"
},
{
"name": "CVE-2022-49971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49971"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2025-21693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21693"
},
{
"name": "CVE-2025-71203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71203"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2025-39789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39789"
},
{
"name": "CVE-2022-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49124"
},
{
"name": "CVE-2024-49901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49901"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2024-56583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56583"
},
{
"name": "CVE-2022-50195",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50195"
},
{
"name": "CVE-2025-40358",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40358"
},
{
"name": "CVE-2024-40998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40998"
},
{
"name": "CVE-2024-56712",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56712"
},
{
"name": "CVE-2025-68318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68318"
},
{
"name": "CVE-2022-49980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49980"
},
{
"name": "CVE-2023-52634",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52634"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2025-62526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62526"
},
{
"name": "CVE-2024-49918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49918"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2024-45776",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45776"
},
{
"name": "CVE-2022-50090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50090"
},
{
"name": "CVE-2025-40340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40340"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2020-14356",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14356"
},
{
"name": "CVE-2025-68745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68745"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2023-53764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53764"
},
{
"name": "CVE-2024-53687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53687"
},
{
"name": "CVE-2025-39901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39901"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2024-38628",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38628"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2025-38672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38672"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-0684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0684"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2024-47794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47794"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2025-38272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38272"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40146"
},
{
"name": "CVE-2025-38359",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38359"
},
{
"name": "CVE-2019-20794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20794"
},
{
"name": "CVE-2023-53849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53849"
},
{
"name": "CVE-2022-4543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4543"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2023-53627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53627"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-38091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38091"
},
{
"name": "CVE-2023-53510",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53510"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2023-53575",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53575"
},
{
"name": "CVE-2022-49516",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49516"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2022-3523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3523"
},
{
"name": "CVE-2026-26157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26157"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2023-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38417"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-22072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22072"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2025-40074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40074"
},
{
"name": "CVE-2026-23193",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23193"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2024-47736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47736"
},
{
"name": "CVE-2023-53037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53037"
},
{
"name": "CVE-2024-46842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46842"
},
{
"name": "CVE-2025-71237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71237"
},
{
"name": "CVE-2025-13462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13462"
},
{
"name": "CVE-2024-50112",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50112"
},
{
"name": "CVE-2025-69646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69646"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2026-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23215"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2020-26142",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26142"
},
{
"name": "CVE-2022-49955",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49955"
},
{
"name": "CVE-2023-53628",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53628"
},
{
"name": "CVE-2025-29943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29943"
},
{
"name": "CVE-2025-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39978"
},
{
"name": "CVE-2023-31346",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31346"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2025-38140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38140"
},
{
"name": "CVE-2022-50002",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50002"
},
{
"name": "CVE-2025-38621",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38621"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39908"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2024-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49920"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2026-23118",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23118"
},
{
"name": "CVE-2025-34034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-34034"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-59692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59692"
},
{
"name": "CVE-2022-50116",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50116"
},
{
"name": "CVE-2018-12931",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12931"
},
{
"name": "CVE-2025-40168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40168"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2022-50224",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50224"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2020-13791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13791"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2024-49990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49990"
},
{
"name": "CVE-2020-15802",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15802"
},
{
"name": "CVE-2020-24240",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24240"
},
{
"name": "CVE-2024-46718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46718"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2023-53545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53545"
},
{
"name": "CVE-2022-50552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50552"
},
{
"name": "CVE-2021-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0066"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2023-53376",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53376"
},
{
"name": "CVE-2023-53538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53538"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2022-50357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50357"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2023-52671",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52671"
},
{
"name": "CVE-2022-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50303"
},
{
"name": "CVE-2024-35870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35870"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-36013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36013"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40196"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2023-52676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52676"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2017-13165",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13165"
},
{
"name": "CVE-2025-38556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38556"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2025-39932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39932"
},
{
"name": "CVE-2024-47683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47683"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-46811",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46811"
},
{
"name": "CVE-2025-21985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21985"
},
{
"name": "CVE-2025-22109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22109"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2025-40040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40040"
},
{
"name": "CVE-2023-53635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53635"
},
{
"name": "CVE-2025-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39810"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2025-23132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23132"
},
{
"name": "CVE-2024-47678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47678"
},
{
"name": "CVE-2022-49531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49531"
},
{
"name": "CVE-2022-49504",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49504"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2022-49810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49810"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-71109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71109"
},
{
"name": "CVE-2023-26586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26586"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-40095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40095"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-44950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44950"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2022-50332",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50332"
},
{
"name": "CVE-2023-53822",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53822"
},
{
"name": "CVE-2024-27408",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27408"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2022-50461",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50461"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2023-26554",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26554"
},
{
"name": "CVE-2025-38486",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38486"
},
{
"name": "CVE-2021-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26934"
},
{
"name": "CVE-2023-53466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53466"
},
{
"name": "CVE-2025-21629",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21629"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-53168",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53168"
},
{
"name": "CVE-2022-49528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49528"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-45888",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45888"
},
{
"name": "CVE-2022-49218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49218"
},
{
"name": "CVE-2023-52749",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52749"
},
{
"name": "CVE-2025-39754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39754"
},
{
"name": "CVE-2025-40286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40286"
},
{
"name": "CVE-2022-49967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49967"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2022-49245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49245"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2023-52682",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52682"
},
{
"name": "CVE-2022-50871",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50871"
},
{
"name": "CVE-2025-71150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71150"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2025-39958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39958"
},
{
"name": "CVE-2018-8956",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8956"
},
{
"name": "CVE-2025-40266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40266"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2022-49420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49420"
},
{
"name": "CVE-2022-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40964"
},
{
"name": "CVE-2025-69873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69873"
},
{
"name": "CVE-2026-3441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3441"
},
{
"name": "CVE-2024-36244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36244"
},
{
"name": "CVE-2023-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53149"
},
{
"name": "CVE-2026-23237",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23237"
},
{
"name": "CVE-2024-49987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49987"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2022-50746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50746"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2024-50034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50034"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-53596",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53596"
},
{
"name": "CVE-2022-49943",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49943"
},
{
"name": "CVE-2022-50260",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50260"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-49568",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49568"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2024-36924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36924"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2023-3397",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3397"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2024-26672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26672"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2023-53806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53806"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-68799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68799"
},
{
"name": "CVE-2021-33139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33139"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2024-50057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50057"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2024-46808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46808"
},
{
"name": "CVE-2026-26158",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26158"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2025-68288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68288"
},
{
"name": "CVE-2025-38168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38168"
},
{
"name": "CVE-2023-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53547"
},
{
"name": "CVE-2019-20426",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20426"
},
{
"name": "CVE-2025-71107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71107"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2026-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-29786"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-40083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40083"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2024-56584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56584"
},
{
"name": "CVE-2026-23235",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23235"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-71152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71152"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-56692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56692"
},
{
"name": "CVE-2024-53196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53196"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2022-50212",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50212"
},
{
"name": "CVE-2026-23087",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23087"
},
{
"name": "CVE-2023-54259",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54259"
},
{
"name": "CVE-2025-68802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68802"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2025-1369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1369"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-68317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68317"
},
{
"name": "CVE-2023-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53231"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2022-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2961"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-49635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49635"
},
{
"name": "CVE-2024-50017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50017"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2024-53241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53241"
},
{
"name": "CVE-2025-14180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14180"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-33155",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33155"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2024-57899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57899"
},
{
"name": "CVE-2024-49928",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49928"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2024-50187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50187"
},
{
"name": "CVE-2022-50851",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50851"
},
{
"name": "CVE-2025-36001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36001"
},
{
"name": "CVE-2022-50464",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50464"
},
{
"name": "CVE-2025-38674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38674"
},
{
"name": "CVE-2025-40093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40093"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-45777",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45777"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2024-40954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40954"
},
{
"name": "CVE-2022-49965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49965"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2024-0564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0564"
},
{
"name": "CVE-2025-39825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39825"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2022-49961",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49961"
},
{
"name": "CVE-2025-69651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69651"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-40335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40335"
},
{
"name": "CVE-2025-40149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40149"
},
{
"name": "CVE-2024-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58098"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2022-28667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28667"
},
{
"name": "CVE-2023-53383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53383"
},
{
"name": "CVE-2024-46717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46717"
},
{
"name": "CVE-2024-25743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25743"
},
{
"name": "CVE-2022-50704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50704"
},
{
"name": "CVE-2025-40164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40164"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2026-23164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23164"
},
{
"name": "CVE-2024-41036",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41036"
},
{
"name": "CVE-2023-53751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53751"
},
{
"name": "CVE-2025-0033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0033"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2024-42319",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42319"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-13716",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13716"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2022-40735",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40735"
},
{
"name": "CVE-2024-36024",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36024"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-54190",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54190"
},
{
"name": "CVE-2023-52879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52879"
},
{
"name": "CVE-2025-68281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68281"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2025-38440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38440"
},
{
"name": "CVE-2026-23124",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23124"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2024-53224",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53224"
},
{
"name": "CVE-2024-49910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49910"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2023-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53105"
},
{
"name": "CVE-2025-68236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68236"
},
{
"name": "CVE-2024-39286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39286"
},
{
"name": "CVE-2025-25184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25184"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-68333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68333"
},
{
"name": "CVE-2024-47689",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47689"
},
{
"name": "CVE-2025-71160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71160"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-52625",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52625"
},
{
"name": "CVE-2023-53353",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53353"
},
{
"name": "CVE-2024-58096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58096"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2023-53401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53401"
},
{
"name": "CVE-2025-22037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22037"
},
{
"name": "CVE-2023-53702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53702"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2024-26842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26842"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2023-54059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54059"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2021-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0170"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-40966",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40966"
},
{
"name": "CVE-2024-53133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53133"
},
{
"name": "CVE-2026-23075",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23075"
},
{
"name": "CVE-2022-50571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50571"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2026-23120",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23120"
},
{
"name": "CVE-2025-40180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40180"
},
{
"name": "CVE-2022-49393",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49393"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2025-39851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39851"
},
{
"name": "CVE-2025-71204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71204"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-26758",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26758"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2023-32651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32651"
},
{
"name": "CVE-2025-37747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37747"
},
{
"name": "CVE-2026-2297",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2297"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2023-53036",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53036"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-71115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71115"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2022-50862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50862"
},
{
"name": "CVE-2025-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1118"
},
{
"name": "CVE-2024-50166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50166"
},
{
"name": "CVE-2024-35862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35862"
},
{
"name": "CVE-2023-53355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53355"
},
{
"name": "CVE-2022-25265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25265"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2026-23181",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23181"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2023-53558",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53558"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-68214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68214"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-22860",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22860"
},
{
"name": "CVE-2025-36365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36365"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2025-40247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40247"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2024-56641",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56641"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2025-0686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0686"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2024-49992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49992"
},
{
"name": "CVE-2025-68781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68781"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2021-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0173"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2024-45778",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45778"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2024-47661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47661"
},
{
"name": "CVE-2026-28418",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28418"
},
{
"name": "CVE-2023-54151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54151"
},
{
"name": "CVE-2025-22022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22022"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2024-46803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46803"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-59466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59466"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2022-36351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36351"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2024-36478",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36478"
},
{
"name": "CVE-2024-43832",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43832"
},
{
"name": "CVE-2026-25639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25639"
},
{
"name": "CVE-2026-1299",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1299"
},
{
"name": "CVE-2024-54683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54683"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2024-46720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46720"
},
{
"name": "CVE-2024-26658",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26658"
},
{
"name": "CVE-2026-2243",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2243"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2024-38564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38564"
},
{
"name": "CVE-2021-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0174"
},
{
"name": "CVE-2025-8746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8746"
},
{
"name": "CVE-2025-36442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36442"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-45779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45779"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2025-40077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40077"
},
{
"name": "CVE-2024-57857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57857"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2022-50213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50213"
},
{
"name": "CVE-2024-46823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46823"
},
{
"name": "CVE-2023-32642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32642"
},
{
"name": "CVE-2025-71227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71227"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2024-46733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46733"
},
{
"name": "CVE-2024-41014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41014"
},
{
"name": "CVE-2022-50015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50015"
},
{
"name": "CVE-2025-40071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40071"
},
{
"name": "CVE-2024-7883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7883"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2022-50772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50772"
},
{
"name": "CVE-2024-56717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56717"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2023-54234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54234"
},
{
"name": "CVE-2022-45885",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45885"
},
{
"name": "CVE-2022-49783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49783"
},
{
"name": "CVE-2025-40305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40305"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2025-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47153"
},
{
"name": "CVE-2025-40080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40080"
},
{
"name": "CVE-2024-53216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53216"
},
{
"name": "CVE-2022-49539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49539"
},
{
"name": "CVE-2024-36347",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36347"
},
{
"name": "CVE-2024-26869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2021-20255",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20255"
},
{
"name": "CVE-2022-48979",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48979"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2025-71193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71193"
},
{
"name": "CVE-2023-54180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54180"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2024-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46848"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2024-36009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36009"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2024-36350",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36350"
},
{
"name": "CVE-2023-25951",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25951"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2023-53152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53152"
},
{
"name": "CVE-2021-0308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0308"
},
{
"name": "CVE-2025-68315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68315"
},
{
"name": "CVE-2024-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50009"
},
{
"name": "CVE-2025-39850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39850"
},
{
"name": "CVE-2022-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1205"
},
{
"name": "CVE-2023-45927",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45927"
},
{
"name": "CVE-2020-25742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25742"
},
{
"name": "CVE-2022-0987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0987"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2025-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40217"
},
{
"name": "CVE-2025-38199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38199"
},
{
"name": "CVE-2025-39905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39905"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2022-50720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50720"
},
{
"name": "CVE-2025-71105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71105"
},
{
"name": "CVE-2023-50387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50387"
},
{
"name": "CVE-2022-49529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49529"
},
{
"name": "CVE-2025-68266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68266"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-39961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39961"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2024-26876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26876"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2023-52657",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52657"
},
{
"name": "CVE-2025-37876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37876"
},
{
"name": "CVE-2024-58089",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58089"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2026-27571",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27571"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2026-27139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27139"
},
{
"name": "CVE-2022-49127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49127"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2020-25741",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25741"
},
{
"name": "CVE-2022-50748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50748"
},
{
"name": "CVE-2023-53767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53767"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21696"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-39863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39863"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53180",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53180"
},
{
"name": "CVE-2026-28419",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28419"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2023-53385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53385"
},
{
"name": "CVE-2026-23206",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23206"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2024-46678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46678"
},
{
"name": "CVE-2024-58097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58097"
},
{
"name": "CVE-2023-53620",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53620"
},
{
"name": "CVE-2022-50539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50539"
},
{
"name": "CVE-2025-71068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71068"
},
{
"name": "CVE-2025-23130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23130"
},
{
"name": "CVE-2022-49496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49496"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2024-56782",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56782"
},
{
"name": "CVE-2025-39957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39957"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2023-53540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53540"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-53261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53261"
},
{
"name": "CVE-2026-24049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24049"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-39931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39931"
},
{
"name": "CVE-2023-54187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54187"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-44032",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44032"
},
{
"name": "CVE-2024-57895",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57895"
},
{
"name": "CVE-2023-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53240"
},
{
"name": "CVE-2025-13735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13735"
},
{
"name": "CVE-2023-53694",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53694"
},
{
"name": "CVE-2024-53195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53195"
},
{
"name": "CVE-2024-35794",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35794"
},
{
"name": "CVE-2023-52829",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52829"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2024-56660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56660"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2025-38033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38033"
},
{
"name": "CVE-2024-41023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41023"
},
{
"name": "CVE-2024-47704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47704"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-49978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49978"
},
{
"name": "CVE-2024-36910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36910"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2025-36366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36366"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2025-36123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36123"
},
{
"name": "CVE-2024-56737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56737"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2020-11935",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11935"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2025-68309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68309"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2025-40003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40003"
},
{
"name": "CVE-2025-22042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22042"
},
{
"name": "CVE-2025-71158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71158"
},
{
"name": "CVE-2022-49803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49803"
},
{
"name": "CVE-2024-57898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57898"
},
{
"name": "CVE-2020-35503",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35503"
},
{
"name": "CVE-2024-49923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49923"
},
{
"name": "CVE-2024-56639",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56639"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-53002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53002"
},
{
"name": "CVE-2021-0183",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0183"
},
{
"name": "CVE-2025-39884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39884"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2024-36914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36914"
},
{
"name": "CVE-2026-26996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26996"
},
{
"name": "CVE-2024-35826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35826"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2022-49764",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49764"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2025-21651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21651"
},
{
"name": "CVE-2025-38092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38092"
},
{
"name": "CVE-2025-22124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22124"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2023-26553",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26553"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-37776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37776"
},
{
"name": "CVE-2021-23840",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23840"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2024-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6519"
},
{
"name": "CVE-2024-46729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46729"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-50266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50266"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2023-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53093"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2024-49991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49991"
},
{
"name": "CVE-2022-50009",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50009"
},
{
"name": "CVE-2022-26047",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26047"
},
{
"name": "CVE-2024-53240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53240"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2024-36949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36949"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-37877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37877"
},
{
"name": "CVE-2024-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2193"
},
{
"name": "CVE-2025-4382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4382"
},
{
"name": "CVE-2022-28693",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28693"
},
{
"name": "CVE-2025-71161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71161"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-22038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22038"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2023-54242",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54242"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2024-41062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41062"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2022-48816",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48816"
},
{
"name": "CVE-2026-27141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27141"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-50518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50518"
},
{
"name": "CVE-2022-49829",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49829"
},
{
"name": "CVE-2025-64756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64756"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2016-2568",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2568"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2018-12929",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12929"
},
{
"name": "CVE-2024-26853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26853"
},
{
"name": "CVE-2024-53147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53147"
},
{
"name": "CVE-2025-39952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39952"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2024-45783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45783"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-53410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53410"
},
{
"name": "CVE-2023-53254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53254"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47210"
},
{
"name": "CVE-2025-68809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68809"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2021-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0165"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2022-49177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49177"
},
{
"name": "CVE-2025-38205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38205"
},
{
"name": "CVE-2026-23100",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23100"
},
{
"name": "CVE-2025-59464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59464"
},
{
"name": "CVE-2024-58241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58241"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2022-49833",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49833"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-68282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68282"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-68817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68817"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2024-46726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46726"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2024-53079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53079"
},
{
"name": "CVE-2025-68787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68787"
},
{
"name": "CVE-2025-1125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1125"
},
{
"name": "CVE-2023-53647",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53647"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2025-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23133"
},
{
"name": "CVE-2025-0012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0012"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2025-71233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71233"
},
{
"name": "CVE-2025-68782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68782"
},
{
"name": "CVE-2021-0166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0166"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2022-3872",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3872"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68177"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2024-49931",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49931"
},
{
"name": "CVE-2024-43866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43866"
},
{
"name": "CVE-2024-37021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37021"
},
{
"name": "CVE-2024-47728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47728"
},
{
"name": "CVE-2025-27610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27610"
},
{
"name": "CVE-2025-68191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68191"
},
{
"name": "CVE-2026-23031",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23031"
},
{
"name": "CVE-2024-46730",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46730"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2025-71127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71127"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2024-46728",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46728"
},
{
"name": "CVE-2023-53561",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53561"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2026-23050",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23050"
},
{
"name": "CVE-2024-58100",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58100"
},
{
"name": "CVE-2020-0256",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0256"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-26954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26954"
},
{
"name": "CVE-2025-21634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21634"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2025-38047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38047"
},
{
"name": "CVE-2024-47738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47738"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2024-41013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41013"
},
{
"name": "CVE-2023-54320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54320"
},
{
"name": "CVE-2024-43911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43911"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2017-0537",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0537"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2025-68219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68219"
},
{
"name": "CVE-2022-50232",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50232"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2023-26112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26112"
},
{
"name": "CVE-2018-6952",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6952"
},
{
"name": "CVE-2020-14304",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14304"
},
{
"name": "CVE-2024-46834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46834"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-40281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40281"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-40110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40110"
},
{
"name": "CVE-2026-24001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24001"
},
{
"name": "CVE-2025-37807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37807"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2022-50016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50016"
},
{
"name": "CVE-2025-29481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29481"
},
{
"name": "CVE-2024-53219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53219"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2024-25740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25740"
},
{
"name": "CVE-2024-50246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50246"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-14178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14178"
},
{
"name": "CVE-2024-57950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57950"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2025-40325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40325"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2024-42321",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42321"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2021-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0176"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2022-48998",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48998"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2024-42273",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42273"
},
{
"name": "CVE-2025-68336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68336"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40303"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2022-49974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49974"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2019-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20633"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2021-3714",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3714"
},
{
"name": "CVE-2023-54071",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54071"
},
{
"name": "CVE-2024-56566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56566"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-40036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40036"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-47745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47745"
},
{
"name": "CVE-2025-39833",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39833"
},
{
"name": "CVE-2026-23097",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23097"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2024-53190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53190"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2024-35784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35784"
},
{
"name": "CVE-2024-56591",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56591"
},
{
"name": "CVE-2024-56544",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56544"
},
{
"name": "CVE-2024-56647",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56647"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2024-57976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57976"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2025-0685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0685"
},
{
"name": "CVE-2024-57893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57893"
},
{
"name": "CVE-2026-23231",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23231"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2022-50071",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50071"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2024-56180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56180"
},
{
"name": "CVE-2023-39333",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39333"
},
{
"name": "CVE-2025-38643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38643"
},
{
"name": "CVE-2021-3864",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3864"
},
{
"name": "CVE-2025-39771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39771"
},
{
"name": "CVE-2023-52591",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52591"
},
{
"name": "CVE-2024-26648",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26648"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2020-24352",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24352"
},
{
"name": "CVE-2024-36000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36000"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-39819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39819"
},
{
"name": "CVE-2022-49296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49296"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2024-49914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49914"
},
{
"name": "CVE-2025-38360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38360"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-36407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36407"
},
{
"name": "CVE-2024-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0217"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2021-47658",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47658"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2019-12067",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12067"
},
{
"name": "CVE-2024-57843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57843"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2024-50135",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50135"
},
{
"name": "CVE-2024-49916",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49916"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2024-49988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49988"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2024-49861",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49861"
},
{
"name": "CVE-2026-23093",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23093"
},
{
"name": "CVE-2024-49893",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49893"
},
{
"name": "CVE-2024-44963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44963"
},
{
"name": "CVE-2023-53348",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53348"
},
{
"name": "CVE-2022-48766",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48766"
},
{
"name": "CVE-2019-15794",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15794"
},
{
"name": "CVE-2024-49917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49917"
},
{
"name": "CVE-2022-50467",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50467"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2024-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48875"
},
{
"name": "CVE-2024-41935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41935"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54047",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54047"
},
{
"name": "CVE-2023-53382",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53382"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2025-39677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39677"
},
{
"name": "CVE-2023-53651",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53651"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2025-68371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68371"
},
{
"name": "CVE-2022-50383",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50383"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-53387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53387"
},
{
"name": "CVE-2026-31802",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-31802"
},
{
"name": "CVE-2024-45774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45774"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2025-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22053"
},
{
"name": "CVE-2025-13465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13465"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
},
{
"name": "CVE-2025-68211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68211"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2022-50863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50863"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2024-35843",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35843"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-39762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39762"
},
{
"name": "CVE-2024-40999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40999"
},
{
"name": "CVE-2023-53292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53292"
},
{
"name": "CVE-2023-52576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52576"
},
{
"name": "CVE-2024-27002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27002"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-57887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57887"
},
{
"name": "CVE-2025-21730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21730"
},
{
"name": "CVE-2024-35865",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35865"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2023-52660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52660"
},
{
"name": "CVE-2024-35995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35995"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2023-53371",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53371"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-22041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22041"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-22127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22127"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2024-27025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27025"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2024-27011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27011"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2026-27904",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-27904"
},
{
"name": "CVE-2024-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38543"
},
{
"name": "CVE-2025-68263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68263"
},
{
"name": "CVE-2023-53187",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53187"
},
{
"name": "CVE-2025-38689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38689"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2022-48744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48744"
},
{
"name": "CVE-2025-38070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38070"
},
{
"name": "CVE-2025-68755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68755"
},
{
"name": "CVE-2025-62525",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62525"
},
{
"name": "CVE-2025-71238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71238"
},
{
"name": "CVE-2021-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0175"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2022-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48706"
},
{
"name": "CVE-2025-40334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40334"
},
{
"name": "CVE-2025-68767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68767"
},
{
"name": "CVE-2024-46716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46716"
},
{
"name": "CVE-2012-4542",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4542"
},
{
"name": "CVE-2021-3773",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3773"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2022-49267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49267"
},
{
"name": "CVE-2024-56592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56592"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-38189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38189"
},
{
"name": "CVE-2022-48628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48628"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-50138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50138"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2021-44534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44534"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2024-56565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56565"
},
{
"name": "CVE-2025-68193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68193"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2024-57872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57872"
},
{
"name": "CVE-2023-28720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28720"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2024-46833",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46833"
},
{
"name": "CVE-2024-47703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47703"
},
{
"name": "CVE-2023-53742",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53742"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38041"
},
{
"name": "CVE-2024-53177",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53177"
},
{
"name": "CVE-2024-56588",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56588"
},
{
"name": "CVE-2023-53452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53452"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-6610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6610"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2022-50616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50616"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2023-53544",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53544"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2024-49911",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49911"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2022-50708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50708"
},
{
"name": "CVE-2026-3784",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3784"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
},
{
"name": "CVE-2025-9301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9301"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-20T00:00:00",
"last_revision_date": "2026-03-20T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0326",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37233",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37233"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37237",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37237"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37236",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37236"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37246",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37246"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37235",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37235"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37229",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37229"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37226",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37226"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37230",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37230"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37242",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37242"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37228",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37228"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37240",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37240"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37243",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37243"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37234",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37234"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37231",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37231"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37239",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37239"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37227",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37227"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37232",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37232"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37247",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37247"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37241",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37241"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37238",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37238"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37244",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37244"
},
{
"published_at": "2026-03-19",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37245",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37245"
}
]
}
CERTFR-2023-AVI-0956
Vulnerability from certfr_avis - Published: 2023-11-17 - Updated: 2023-11-17
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et une injection de code indirecte à distance (XSS).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | N/A | Splunk extension pour Google Cloud Platform versions antérieures à 4.3.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.1.x antérieures à 9.1.2 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.0.x antérieures à 9.0.7 | ||
| Splunk | N/A | Splunk extension pour Amazon Web Services versions antérieures à 7.2.0 | ||
| Splunk | N/A | Splunk Cloud versions antérieures à 9.1.2308 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk extension pour Google Cloud Platform versions ant\u00e9rieures \u00e0 4.3.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.2",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.0.x ant\u00e9rieures \u00e0 9.0.7",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk extension pour Amazon Web Services versions ant\u00e9rieures \u00e0 7.2.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud versions ant\u00e9rieures \u00e0 9.1.2308",
"product": {
"name": "N/A",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2023-46213",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46213"
},
{
"name": "CVE-2023-46214",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46214"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-31799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31799"
}
],
"initial_release_date": "2023-11-17T00:00:00",
"last_revision_date": "2023-11-17T00:00:00",
"links": [],
"reference": "CERTFR-2023-AVI-0956",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2023-11-17T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits Splunk\u003c/span\u003e. Elles permettent \u00e0 un\nattaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par\nl\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0 distance et une injection\nde code indirecte \u00e0 distance (XSS).\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1105 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1105"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1101 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1101"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1102 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1102"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1106 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1106"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1103 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1103"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1104 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1104"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2023-1107 du 16 novembre 2023",
"url": "https://advisory.splunk.com/advisories/SVD-2023-1107"
}
]
}
CERTFR-2024-AVI-0145
Vulnerability from certfr_avis - Published: 2024-02-16 - Updated: 2024-02-16
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une atteinte à la confidentialité des données, une exécution de code arbitraire à distance et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Db2 | IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | QRadar Suite Software | QRadar Suite Software versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | N/A | IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions antérieures à v4.8.2 | ||
| IBM | QRadar SIEM | IBM QRadar SIEM versions 7.5.x antérieures à 7.5.0 UP7 IF05 | ||
| IBM | QRadar | IBM QRadar Use Case Manager App versions antérieures à 3.9.0 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | WebSphere | IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.1.x.x antérieures à 6.1.0.23 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.3.x.x antérieures à 6.3.0.6 | ||
| IBM | Sterling Connect:Direct | IBM Sterling Connect:Direct Web Services versions 6.2.x.x antérieures à 6.2.0.22 | ||
| IBM | Db2 | IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de sécurité Fixpack cumulatif Db2 | ||
| IBM | Cloud Pak | IBM Cloud Pak for Security versions 1.10.x.x antérieures à 1.10.18.0 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.x.x antérieures à 5.1.2.15 | ||
| IBM | WebSphere | IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20 | ||
| IBM | QRadar WinCollect Agent | IBM QRadar WinCollect Agent versions 10.0.x antérieures à 10.1.9 | ||
| IBM | Spectrum | IBM Spectrum Scale versions 5.1.3.x antérieures à 5.1.9.2 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cloud APM, Advanced Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite Software versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 sur Cloud Pak pour Data et Db2 Warehouse sur Cloud Pak for Data versions ant\u00e9rieures \u00e0 v4.8.2",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar SIEM versions 7.5.x ant\u00e9rieures \u00e0 7.5.0 UP7 IF05",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar Use Case Manager App versions ant\u00e9rieures \u00e0 3.9.0",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 8.5.x.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server Liberty sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.1.x.x ant\u00e9rieures \u00e0 6.1.0.23",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.3.x.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Sterling Connect:Direct Web Services versions 6.2.x.x ant\u00e9rieures \u00e0 6.2.0.22",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud APM, Base Private versions 8.1.4 sans le dernier correctif de s\u00e9curit\u00e9 Fixpack cumulatif Db2",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cloud Pak for Security versions 1.10.x.x ant\u00e9rieures \u00e0 1.10.18.0",
"product": {
"name": "Cloud Pak",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.x.x ant\u00e9rieures \u00e0 5.1.2.15",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server versions 9.x sans le SDK version 8 Service Refresh 8 FP20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM QRadar WinCollect Agent versions 10.0.x ant\u00e9rieures \u00e0 10.1.9",
"product": {
"name": "QRadar WinCollect Agent",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Spectrum Scale versions 5.1.3.x ant\u00e9rieures \u00e0 5.1.9.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-8385",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8385"
},
{
"name": "CVE-2015-8388",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8388"
},
{
"name": "CVE-2015-8392",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8392"
},
{
"name": "CVE-2015-2327",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2327"
},
{
"name": "CVE-2015-8394",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8394"
},
{
"name": "CVE-2015-8395",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8395"
},
{
"name": "CVE-2015-8387",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8387"
},
{
"name": "CVE-2015-8391",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8391"
},
{
"name": "CVE-2015-8383",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8383"
},
{
"name": "CVE-2015-8390",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8390"
},
{
"name": "CVE-2015-8381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8381"
},
{
"name": "CVE-2015-8386",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8386"
},
{
"name": "CVE-2015-2328",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2328"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2021-31525",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31525"
},
{
"name": "CVE-2021-3712",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3712"
},
{
"name": "CVE-2021-3711",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3711"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2021-33197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33197"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-33195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33195"
},
{
"name": "CVE-2021-4160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4160"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-0778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0778"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2021-33196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33196"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2021-27918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27918"
},
{
"name": "CVE-2021-41190",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41190"
},
{
"name": "CVE-2021-33194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33194"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2022-43548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43548"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-25881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25881"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-29244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29244"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2023-23918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23918"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2020-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8244"
},
{
"name": "CVE-2023-23920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23920"
},
{
"name": "CVE-2023-23919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23919"
},
{
"name": "CVE-2023-23936",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23936"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-32360",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32360"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2023-2597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2597"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-20593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20593"
},
{
"name": "CVE-2023-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3611"
},
{
"name": "CVE-2022-40982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40982"
},
{
"name": "CVE-2023-20569",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20569"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-3776",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3776"
},
{
"name": "CVE-2023-4128",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4128"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-26048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26048"
},
{
"name": "CVE-2023-26049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26049"
},
{
"name": "CVE-2023-4206",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4206"
},
{
"name": "CVE-2023-4208",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4208"
},
{
"name": "CVE-2023-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4207"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-45648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45648"
},
{
"name": "CVE-2023-42795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42795"
},
{
"name": "CVE-2023-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30991"
},
{
"name": "CVE-2022-48339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48339"
},
{
"name": "CVE-2023-33850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33850"
},
{
"name": "CVE-2023-39976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39976"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32002"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-44270",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44270"
},
{
"name": "CVE-2020-15586",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15586"
},
{
"name": "CVE-2020-28362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28362"
},
{
"name": "CVE-2020-14039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14039"
},
{
"name": "CVE-2020-16845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16845"
},
{
"name": "CVE-2021-3114",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3114"
},
{
"name": "CVE-2020-24553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24553"
},
{
"name": "CVE-2020-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28366"
},
{
"name": "CVE-2020-28367",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28367"
},
{
"name": "CVE-2023-34054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34054"
},
{
"name": "CVE-2023-34053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34053"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-46589",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46589"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2002-0059",
"url": "https://www.cve.org/CVERecord?id=CVE-2002-0059"
},
{
"name": "CVE-2023-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38003"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-45133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45133"
},
{
"name": "CVE-2015-8393",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8393"
},
{
"name": "CVE-2020-19909",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19909"
},
{
"name": "CVE-2023-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30987"
},
{
"name": "CVE-2023-38719",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38719"
},
{
"name": "CVE-2023-40374",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40374"
},
{
"name": "CVE-2023-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38728"
},
{
"name": "CVE-2023-38720",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38720"
},
{
"name": "CVE-2023-38740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38740"
},
{
"name": "CVE-2023-40372",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40372"
},
{
"name": "CVE-2023-40373",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40373"
},
{
"name": "CVE-2023-47145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47145"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-45857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45857"
},
{
"name": "CVE-2023-5676",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5676"
},
{
"name": "CVE-2023-46308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46308"
},
{
"name": "CVE-2023-32006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32006"
},
{
"name": "CVE-2023-32559",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32559"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-23541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23541"
},
{
"name": "CVE-2022-36046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36046"
},
{
"name": "CVE-2023-40692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40692"
},
{
"name": "CVE-2023-44981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44981"
},
{
"name": "CVE-2023-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38727"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2022-48337",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48337"
},
{
"name": "CVE-2023-47627",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47627"
},
{
"name": "CVE-2023-47701",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47701"
},
{
"name": "CVE-2023-49081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49081"
},
{
"name": "CVE-2023-26159",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26159"
},
{
"name": "CVE-2023-29258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29258"
},
{
"name": "CVE-2023-39332",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39332"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-22190",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22190"
},
{
"name": "CVE-2023-4586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4586"
},
{
"name": "CVE-2023-43020",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43020"
},
{
"name": "CVE-2023-37276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37276"
},
{
"name": "CVE-2023-47152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47152"
},
{
"name": "CVE-2023-49082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49082"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47141"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38552"
},
{
"name": "CVE-2023-46167",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46167"
},
{
"name": "CVE-2023-27859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27859"
},
{
"name": "CVE-2023-47158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47158"
},
{
"name": "CVE-2023-36665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36665"
},
{
"name": "CVE-2022-23529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23529"
},
{
"name": "CVE-2023-40687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40687"
},
{
"name": "CVE-2022-23539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23539"
},
{
"name": "CVE-2023-6681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6681"
},
{
"name": "CVE-2022-23540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23540"
},
{
"name": "CVE-2023-46234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46234"
},
{
"name": "CVE-2023-50308",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50308"
},
{
"name": "CVE-2023-39331",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39331"
},
{
"name": "CVE-2023-45178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45178"
},
{
"name": "CVE-2023-45193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45193"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2020-29510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29510"
},
{
"name": "CVE-2023-47746",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47746"
},
{
"name": "CVE-2023-34062",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34062"
},
{
"name": "CVE-2023-47747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47747"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-46158",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46158"
},
{
"name": "CVE-2023-26115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26115"
}
],
"initial_release_date": "2024-02-16T00:00:00",
"last_revision_date": "2024-02-16T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0145",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-02-16T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans \u003cspan\nclass=\"textit\"\u003eles produits IBM\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une atteinte \u00e0 la confidentialit\u00e9\ndes donn\u00e9es, une ex\u00e9cution de code arbitraire \u00e0 distance et une\n\u00e9l\u00e9vation de privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117872 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117872"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118592 du 16 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118592"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117873 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117873"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118289 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118289"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7118351 du 15 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7118351"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117821 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117821"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117883 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117883"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117881 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117881"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7117884 du 14 f\u00e9vrier 2024",
"url": "https://www.ibm.com/support/pages/node/7117884"
}
]
}
CERTFR-2024-AVI-0741
Vulnerability from certfr_avis - Published: 2024-09-05 - Updated: 2024-10-15
De multiples vulnérabilités ont été découvertes dans les produits Juniper Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions antérieures à 7.5.0 UP9 IF02 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP9 IF02",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2024-42472",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42472"
},
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-4692",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4692"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2024-26656",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26656"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-26974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26974"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2023-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43788"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-26585",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26585"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-27397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27397"
},
{
"name": "CVE-2024-35854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35854"
},
{
"name": "CVE-2023-52878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52878"
},
{
"name": "CVE-2021-47185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
},
{
"name": "CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2024-5564",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5564"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2024-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3933"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-52669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52669"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2020-15778",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15778"
},
{
"name": "CVE-2022-3287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3287"
},
{
"name": "CVE-2024-36004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36004"
},
{
"name": "CVE-2024-26859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26859"
},
{
"name": "CVE-2020-13936",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13936"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2024-35855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35855"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2023-45802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45802"
},
{
"name": "CVE-2024-26801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26801"
},
{
"name": "CVE-2024-36007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36007"
},
{
"name": "CVE-2021-47311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47311"
},
{
"name": "CVE-2023-3635",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3635"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-35852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35852"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-27048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2024-35845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35845"
},
{
"name": "CVE-2021-41072",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41072"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-47073",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47073"
},
{
"name": "CVE-2024-26804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26804"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-47171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2021-47236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47236"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2021-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
},
{
"name": "CVE-2024-35890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35890"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-26826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26826"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2024-26583",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26583"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2021-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
},
{
"name": "CVE-2024-35888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35888"
},
{
"name": "CVE-2023-52700",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52700"
},
{
"name": "CVE-2023-31122",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31122"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2024-26675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26675"
},
{
"name": "CVE-2019-14865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14865"
},
{
"name": "CVE-2024-26906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26906"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
},
{
"name": "CVE-2024-26584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26584"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-3019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3019"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-43789",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43789"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-35835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35835"
},
{
"name": "CVE-2024-26735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26735"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2023-4693",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4693"
},
{
"name": "CVE-2021-46972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46972"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2024-1048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1048"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2023-52667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52667"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-26759",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26759"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2023-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52615"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2021-47069",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47069"
},
{
"name": "CVE-2024-35960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35960"
},
{
"name": "CVE-2022-39253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39253"
},
{
"name": "CVE-2024-34064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34064"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2020-26555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26555"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2024-35789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35789"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2024-26982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26982"
},
{
"name": "CVE-2021-47310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47310"
},
{
"name": "CVE-2023-52626",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52626"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-35958",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35958"
},
{
"name": "CVE-2021-47456",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47456"
},
{
"name": "CVE-2021-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40153"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2022-48669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2021-47356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47356"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2021-47353",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47353"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2018-25091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
},
{
"name": "CVE-2023-5090",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5090"
},
{
"name": "CVE-2024-27410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27410"
},
{
"name": "CVE-2021-46909",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46909"
},
{
"name": "CVE-2024-35853",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35853"
},
{
"name": "CVE-2024-26907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26907"
}
],
"initial_release_date": "2024-09-05T00:00:00",
"last_revision_date": "2024-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0741",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-05T00:00:00.000000"
},
{
"description": "Ajout r\u00e9f\u00e9rence \u00e9diteur",
"revision_date": "2024-09-06T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2024-09-30",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA86686",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP9-IF02"
}
]
}
CERTFR-2024-AVI-0646
Vulnerability from certfr_avis - Published: 2024-08-02 - Updated: 2024-08-02
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Storage Protect | Storage Protect Plus Server versions 10.1.x antérieures à 10.1.16.2 | ||
| IBM | WebSphere | WebSphere Application Server Liberty versions antérieures à 24.0.0.5 | ||
| IBM | VIOS | VIOS version 4.1 avec un fichier openssl.base versions antérieures à 3.0.13.1000 | ||
| IBM | WebSphere | WebSphere Application Server versions 8.5.x antérieures à 8.5.5.25 | ||
| IBM | AIX | AIX versions 7.2 et 7.3 avec un fichier openssl.base versions antérieures à 1.1.1.2400 ou 3.0.13.1000 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.x antérieures à 9.0.5.20 | ||
| IBM | N/A | Sterling Control Center versions 6.3.0 antérieures à 6.3.0.0 iFix06 | ||
| IBM | N/A | Sterling Control Center versions 6.2.1 antérieures à 6.2.1.0 iFix13 | ||
| IBM | VIOS | VIOS versions 3.1 et 4.1 avec un fichier openssl.base versions antérieures à 1.1.1.2400 ou 3.0.13.1000 | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0.x antérieures à 7.5.0 UP9 IF01 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Storage Protect Plus Server versions 10.1.x ant\u00e9rieures \u00e0 10.1.16.2",
"product": {
"name": "Storage Protect",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty versions ant\u00e9rieures \u00e0 24.0.0.5 ",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS version 4.1 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 3.0.13.1000",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 8.5.x ant\u00e9rieures \u00e0 8.5.5.25",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "AIX versions 7.2 et 7.3 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 1.1.1.2400 ou 3.0.13.1000",
"product": {
"name": "AIX",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.x ant\u00e9rieures \u00e0 9.0.5.20",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.3.0 ant\u00e9rieures \u00e0 6.3.0.0 iFix06",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Control Center versions 6.2.1 ant\u00e9rieures \u00e0 6.2.1.0 iFix13",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "VIOS versions 3.1 et 4.1 avec un fichier openssl.base versions ant\u00e9rieures \u00e0 1.1.1.2400 ou 3.0.13.1000",
"product": {
"name": "VIOS",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0.x ant\u00e9rieures \u00e0 7.5.0 UP9 IF01",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-26934",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26934"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2024-27059",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27059"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-26897",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26897"
},
{
"name": "CVE-2021-47055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47055"
},
{
"name": "CVE-2024-35154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35154"
},
{
"name": "CVE-2020-36777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36777"
},
{
"name": "CVE-2024-27052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27052"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-25744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25744"
},
{
"name": "CVE-2024-26973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26973"
},
{
"name": "CVE-2021-47185",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47185"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2024-23650",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23650"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2021-33198",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33198"
},
{
"name": "CVE-2024-26993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26993"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2024-3652",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3652"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-26643",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26643"
},
{
"name": "CVE-2024-26779",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26779"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-32021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32021"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-24806",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24806"
},
{
"name": "CVE-2024-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23307"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2024-27048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27048"
},
{
"name": "CVE-2021-47013",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47013"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2024-26593",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26593"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2022-48627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48627"
},
{
"name": "CVE-2021-47171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47171"
},
{
"name": "CVE-2024-26743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26743"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-6240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6240"
},
{
"name": "CVE-2024-32004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32004"
},
{
"name": "CVE-2021-47118",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47118"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-32020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32020"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-22329",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22329"
},
{
"name": "CVE-2019-20372",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20372"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-32487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32487"
},
{
"name": "CVE-2024-27056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27056"
},
{
"name": "CVE-2024-26642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26642"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2021-47153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47153"
},
{
"name": "CVE-2023-52439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52439"
},
{
"name": "CVE-2024-26610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26610"
},
{
"name": "CVE-2024-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2357"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-26919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26919"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-1394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1394"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2024-32465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32465"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2023-52578",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52578"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2022-38096",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38096"
},
{
"name": "CVE-2021-46934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46934"
},
{
"name": "CVE-2023-52598",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52598"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-26659",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26659"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2023-46604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46604"
},
{
"name": "CVE-2023-52594",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52594"
},
{
"name": "CVE-2024-26693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26693"
},
{
"name": "CVE-2023-52595",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52595"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2022-48624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48624"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2023-52610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52610"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2023-52606",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52606"
},
{
"name": "CVE-2023-6546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6546"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-26872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26872"
},
{
"name": "CVE-2024-26901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26901"
},
{
"name": "CVE-2024-1086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1086"
},
{
"name": "CVE-2024-0565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0340"
},
{
"name": "CVE-2024-26744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26744"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-32002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32002"
},
{
"name": "CVE-2022-48669",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48669"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2024-26694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26694"
},
{
"name": "CVE-2024-26664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26664"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2023-52607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52607"
},
{
"name": "CVE-2018-25091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25091"
},
{
"name": "CVE-2023-6931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6931"
}
],
"initial_release_date": "2024-08-02T00:00:00",
"last_revision_date": "2024-08-02T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0646",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-08-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-07-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161679",
"url": "https://www.ibm.com/support/pages/node/7161679"
},
{
"published_at": "2024-07-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161667",
"url": "https://www.ibm.com/support/pages/node/7161667"
},
{
"published_at": "2024-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7161954",
"url": "https://www.ibm.com/support/pages/node/7161954"
},
{
"published_at": "2024-07-30",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7162032",
"url": "https://www.ibm.com/support/pages/node/7162032"
},
{
"published_at": "2024-07-12",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7160144",
"url": "https://www.ibm.com/support/pages/node/7160144"
},
{
"published_at": "2024-07-31",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7162077",
"url": "https://www.ibm.com/support/pages/node/7162077"
}
]
}
CERTFR-2024-AVI-0878
Vulnerability from certfr_avis - Published: 2024-10-15 - Updated: 2024-10-15
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.2.x antérieures à 9.2.3 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.1.x antérieures à 9.1.6 | ||
| Splunk | Splunk Enterprise | Splunk Entreprise versions 9.3.x antérieures à 9.3.1 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2308.x antérieures à 9.1.2308.208 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.1.2312.x antérieures à 9.1.2312.205 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2403.x antérieures à 9.2.2403.108 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Entreprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.3",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.1.x ant\u00e9rieures \u00e0 9.1.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Entreprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2308.x ant\u00e9rieures \u00e0 9.1.2308.208",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.1.2312.x ant\u00e9rieures \u00e0 9.1.2312.205",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2403.x ant\u00e9rieures \u00e0 9.2.2403.108",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2017-14159",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14159"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2020-36230",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36230"
},
{
"name": "CVE-2024-45733",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45733"
},
{
"name": "CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"name": "CVE-2020-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36221"
},
{
"name": "CVE-2024-45731",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45731"
},
{
"name": "CVE-2019-13057",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13057"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-29401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29401"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2015-3276",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3276"
},
{
"name": "CVE-2020-36225",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36225"
},
{
"name": "CVE-2024-45739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45739"
},
{
"name": "CVE-2023-39321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39321"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2020-36224",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36224"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2021-27212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27212"
},
{
"name": "CVE-2020-36228",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36228"
},
{
"name": "CVE-2020-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36227"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2020-15719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15719"
},
{
"name": "CVE-2024-45740",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45740"
},
{
"name": "CVE-2024-45736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45736"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-39320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39320"
},
{
"name": "CVE-2017-17740",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17740"
},
{
"name": "CVE-2024-45741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45741"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2020-36223",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36223"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-45737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45737"
},
{
"name": "CVE-2020-36229",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36229"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-45732",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45732"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-45735",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45735"
},
{
"name": "CVE-2023-50658",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50658"
},
{
"name": "CVE-2023-47108",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47108"
},
{
"name": "CVE-2023-26125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26125"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2024-45738",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45738"
},
{
"name": "CVE-2020-36226",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36226"
},
{
"name": "CVE-2020-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36222"
},
{
"name": "CVE-2023-39322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39322"
},
{
"name": "CVE-2022-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42969"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2019-13565",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13565"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-45734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45734"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
}
],
"initial_release_date": "2024-10-15T00:00:00",
"last_revision_date": "2024-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0878",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1008",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1008"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1005"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1006"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1002"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1003"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1007"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1004"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1010",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1010"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1011",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1011"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1012",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1012"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1009",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1009"
},
{
"published_at": "2024-10-14",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2024-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2024-1001"
}
]
}
GHSA-G4MX-Q9VG-27P4
Vulnerability from github – Published: 2023-10-17 20:15 – Updated: 2025-11-04 16:46urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 303 "See Other" after the request had its method changed from one that could accept a request body (like POST) to GET as is required by HTTP RFCs. Although the behavior of removing the request body is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers.
From RFC 9110 Section 9.3.1:
A client SHOULD NOT generate content in a GET request unless it is made directly to an origin server that has previously indicated, in or out of band, that such a request has a purpose and will be adequately supported.
Affected usages
Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable.
Both of the following conditions must be true to be affected by this vulnerability:
- If you're using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON)
- The origin service is compromised and starts redirecting using 303 to a malicious peer or the redirected-to service becomes compromised.
Remediation
You can remediate this vulnerability with any of the following steps:
- Upgrade to a patched version of urllib3 (v1.26.18 or v2.0.7)
- Disable redirects for services that you aren't expecting to respond with redirects with
redirects=False. - Disable automatic redirects with
redirects=Falseand handle 303 redirects manually by stripping the HTTP request body.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.0.7"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.18"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-45803"
],
"database_specific": {
"cwe_ids": [
"CWE-200"
],
"github_reviewed": true,
"github_reviewed_at": "2023-10-17T20:15:25Z",
"nvd_published_at": "2023-10-17T20:15:10Z",
"severity": "MODERATE"
},
"details": "urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 303 \"See Other\" after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although the behavior of removing the request body is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers.\n\nFrom [RFC 9110 Section 9.3.1](https://www.rfc-editor.org/rfc/rfc9110.html#name-get):\n\n\u003e A client SHOULD NOT generate content in a GET request unless it is made directly to an origin server that has previously indicated, in or out of band, that such a request has a purpose and will be adequately supported.\n\n## Affected usages\n\nBecause the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable.\n\nBoth of the following conditions must be true to be affected by this vulnerability:\n\n* If you\u0027re using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON)\n* The origin service is compromised and starts redirecting using 303 to a malicious peer or the redirected-to service becomes compromised.\n\n## Remediation\n\nYou can remediate this vulnerability with any of the following steps:\n\n* Upgrade to a patched version of urllib3 (v1.26.18 or v2.0.7)\n* Disable redirects for services that you aren\u0027t expecting to respond with redirects with `redirects=False`.\n* Disable automatic redirects with `redirects=False` and handle 303 redirects manually by stripping the HTTP request body.",
"id": "GHSA-g4mx-q9vg-27p4",
"modified": "2025-11-04T16:46:22Z",
"published": "2023-10-17T20:15:25Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45803"
},
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/commit/4e50fbc5db74e32cabd5ccc1ab81fc103adfe0b3"
},
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/commit/b594c5ceaca38e1ac215f916538fb128e3526a36"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/urllib3/PYSEC-2023-212.yaml"
},
{
"type": "PACKAGE",
"url": "https://github.com/urllib3/urllib3"
},
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/releases/tag/1.26.18"
},
{
"type": "WEB",
"url": "https://github.com/urllib3/urllib3/releases/tag/2.0.7"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX"
},
{
"type": "WEB",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "urllib3\u0027s request body not stripped after redirect from 303 status changes request method to GET"
}
FKIE_CVE-2023-45803
Vulnerability from fkie_nvd - Published: 2023-10-17 20:15 - Updated: 2025-11-03 22:164.2 (Medium) - CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 | Patch | |
| security-advisories@github.com | https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 | Third Party Advisory | |
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/ | ||
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ | ||
| security-advisories@github.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/ | Mailing List | |
| security-advisories@github.com | https://www.rfc-editor.org/rfc/rfc9110.html#name-get | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.rfc-editor.org/rfc/rfc9110.html#name-get | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F2284A6-F467-4419-9AF7-9FFD133B04E5",
"versionEndExcluding": "1.26.18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A586164-F448-431C-8966-14E145A82BB5",
"versionEndExcluding": "2.0.7",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body."
},
{
"lang": "es",
"value": "urllib3 es una librer\u00eda cliente HTTP f\u00e1cil de usar para Python. Anteriormente, urllib3 no eliminaba el cuerpo de la solicitud HTTP cuando una respuesta de redirecci\u00f3n HTTP usaba el estado 301, 302 o 303 despu\u00e9s de que la solicitud cambiara su m\u00e9todo de uno que pudiera aceptar un cuerpo de solicitud (como `POST`) a `GET` tal como est\u00e1. requerido por los RFC HTTP. Aunque este comportamiento no se especifica en la secci\u00f3n de redirecciones, se puede inferir reuniendo informaci\u00f3n de diferentes secciones y hemos observado el comportamiento en otras implementaciones importantes de clientes HTTP como curl y navegadores web. Debido a que la vulnerabilidad requiere que un servicio previamente confiable se vea comprometido para tener un impacto en la confidencialidad, creemos que la explotabilidad de esta vulnerabilidad es baja. Adem\u00e1s, muchos usuarios no colocan datos confidenciales en los cuerpos de solicitud HTTP; si este es el caso, entonces esta vulnerabilidad no es explotable. Las dos condiciones siguientes deben ser ciertas para verse afectado por esta vulnerabilidad: 1. Usar urllib3 y enviar informaci\u00f3n confidencial en el cuerpo de la solicitud HTTP (como datos de formulario o JSON) y 2. El servicio de origen est\u00e1 comprometido y comienza a redireccionar usando 301. 302 o 303 a un par malicioso o el servicio redirigido se ve comprometido. Este problema se solucion\u00f3 en las versiones 1.26.18 y 2.0.7 y se recomienda a los usuarios que actualicen para resolverlo. Los usuarios que no puedan actualizar deben deshabilitar los redireccionamientos para servicios que no esperan responder con redireccionamientos con `redirects=False` y deshabilitar los redireccionamientos autom\u00e1ticos con `redirects=False` y manejar los redireccionamientos 301, 302 y 303 manualmente eliminando el cuerpo de la solicitud HTTP."
}
],
"id": "CVE-2023-45803",
"lastModified": "2025-11-03T22:16:28.170",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-17T20:15:10.070",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
},
{
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
],
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00020.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
WID-SEC-W-2023-2964
Vulnerability from csaf_certbund - Published: 2023-11-16 23:00 - Updated: 2025-07-24 22:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Splunk Enterprise erm\u00f6glicht Monitoring und Analyse von Clickstream-Daten und Kundentransaktionen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Splunk Splunk Enterprise ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren, um Code auszuf\u00fchren und um nicht n\u00e4her spezifizierte Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2964 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2964.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2964 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2964"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1103 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1103"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1104 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1104"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1101 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1101"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1102 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1102"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1105 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1105"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1105 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1106"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2023-1107 vom 2023-11-16",
"url": "https://advisory.splunk.com//advisories/SVD-2023-1107"
},
{
"category": "external",
"summary": "PoC auf Nathans Security Blog vom 2023-11-16",
"url": "https://blog.hrncirik.net/cve-2023-46214-analysis"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7101062 vom 2023-12-21",
"url": "https://aix.software.ibm.com/aix/efixes/security/python_advisory7.asc"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2387 vom 2024-01-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2387.html"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0109 vom 2024-01-22",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0109"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0464 vom 2024-01-25",
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7117884 vom 2024-02-14",
"url": "https://www.ibm.com/support/pages/node/7117884"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX24-005 vom 2024-03-04",
"url": "https://security.business.xerox.com/wp-content/uploads/2024/03/Xerox-Security-Bulletin-XRX24-005-Xerox-FreeFlow%C2%AE-Print-Server-v9_Feb-2024.pdf"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1155 vom 2024-03-06",
"url": "https://access.redhat.com/errata/RHSA-2024:1155"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1383 vom 2024-03-19",
"url": "https://access.redhat.com/errata/RHSA-2024:1383"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7148094 vom 2024-04-11",
"url": "https://www.ibm.com/support/pages/node/7148094"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2988 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2988.html"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-012 vom 2024-07-02",
"url": "https://www.dell.com/support/kbdoc/de-de/000226582/dsa-2024-012-security-update-for-dell-networker-virtual-edition-networker-management-console-multiple-component-vulnerabilities"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0718 vom 2024-07-02",
"url": "https://advisory.splunk.com/advisories/SVD-2024-0718"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-0801 vom 2024-08-12",
"url": "https://advisory.splunk.com//advisories/SVD-2024-0801"
},
{
"category": "external",
"summary": "Splunk Security Advisory SVD-2024-1012 vom 2024-10-14",
"url": "https://advisory.splunk.com//advisories/SVD-2024-1012"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-6AA3B5248F vom 2024-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-6aa3b5248f"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-C4377D35E6 vom 2024-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c4377d35e6"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2024-D335B971E7 vom 2024-12-08",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-d335b971e7"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11189 vom 2024-12-18",
"url": "https://linux.oracle.com/errata/ELSA-2024-11189.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0892 vom 2025-02-03",
"url": "https://access.redhat.com/errata/RHSA-2025:0892"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7240431"
}
],
"source_lang": "en-US",
"title": "Splunk Enterprise: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-24T22:00:00.000+00:00",
"generator": {
"date": "2025-07-25T07:12:01.755+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-2964",
"initial_release_date": "2023-11-16T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-11-16T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "PoC aufgenommen"
},
{
"date": "2023-12-21T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-01-09T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-01-22T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-01-25T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-14T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-03-03T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2024-03-05T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-03-19T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-11T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Dell und Splunk-SVD aufgenommen"
},
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-10-14T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Splunk-SVD aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2024-12-17T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-02-02T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "19"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T024663",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:-"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "product_name",
"name": "MQ"
},
{
"branches": [
{
"category": "product_version",
"name": "7.5",
"product": {
"name": "IBM QRadar SIEM 7.5",
"product_id": "T022954",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Splunk Splunk Enterprise",
"product": {
"name": "Splunk Splunk Enterprise",
"product_id": "T008911",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.7",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.7",
"product_id": "T031266"
}
},
{
"category": "product_version",
"name": "9.0.7",
"product": {
"name": "Splunk Splunk Enterprise 9.0.7",
"product_id": "T031266-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.2",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.2",
"product_id": "T031267"
}
},
{
"category": "product_version",
"name": "9.1.2",
"product": {
"name": "Splunk Splunk Enterprise 9.1.2",
"product_id": "T031267-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.8",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.8",
"product_id": "T032269"
}
},
{
"category": "product_version",
"name": "9.0.8",
"product": {
"name": "Splunk Splunk Enterprise 9.0.8",
"product_id": "T032269-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.8"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.3",
"product_id": "T032270"
}
},
{
"category": "product_version",
"name": "9.1.3",
"product": {
"name": "Splunk Splunk Enterprise 9.1.3",
"product_id": "T032270-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.1",
"product_id": "T033705"
}
},
{
"category": "product_version",
"name": "9.2.1",
"product": {
"name": "Splunk Splunk Enterprise 9.2.1",
"product_id": "T033705-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.4",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.4",
"product_id": "T033718"
}
},
{
"category": "product_version",
"name": "9.1.4",
"product": {
"name": "Splunk Splunk Enterprise 9.1.4",
"product_id": "T033718-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.4"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.0.9",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.0.9",
"product_id": "T033720"
}
},
{
"category": "product_version",
"name": "9.0.9",
"product": {
"name": "Splunk Splunk Enterprise 9.0.9",
"product_id": "T033720-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.0.9"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.3.1",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.3.1",
"product_id": "T038314"
}
},
{
"category": "product_version",
"name": "9.3.1",
"product": {
"name": "Splunk Splunk Enterprise 9.3.1",
"product_id": "T038314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.3.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.2.3",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.2.3",
"product_id": "T038315"
}
},
{
"category": "product_version",
"name": "9.2.3",
"product": {
"name": "Splunk Splunk Enterprise 9.2.3",
"product_id": "T038315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.2.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9.1.6",
"product": {
"name": "Splunk Splunk Enterprise \u003c9.1.6",
"product_id": "T038316"
}
},
{
"category": "product_version",
"name": "9.1.6",
"product": {
"name": "Splunk Splunk Enterprise 9.1.6",
"product_id": "T038316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:splunk:splunk:9.1.6"
}
}
}
],
"category": "product_name",
"name": "Splunk Enterprise"
}
],
"category": "vendor",
"name": "Splunk"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-22570",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2021-22570"
},
{
"cve": "CVE-2022-25883",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2022-25883"
},
{
"cve": "CVE-2022-31799",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2022-31799"
},
{
"cve": "CVE-2023-24329",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-3446",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-37920",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-37920"
},
{
"cve": "CVE-2023-3817",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-43804",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44270",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-44270"
},
{
"cve": "CVE-2023-45803",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2023-46213",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-46213"
},
{
"cve": "CVE-2023-46214",
"product_status": {
"known_affected": [
"T032269",
"T031267",
"T031266",
"T033720",
"67646",
"T008911",
"1522854",
"T038314",
"T015632",
"T032270",
"T038315",
"T036688",
"T038316",
"T004914",
"74185",
"T022954",
"1139691",
"T024663",
"T033718",
"398363",
"T033705"
]
},
"release_date": "2023-11-16T23:00:00.000+00:00",
"title": "CVE-2023-46214"
}
]
}
WID-SEC-W-2024-0794
Vulnerability from csaf_certbund - Published: 2024-04-04 22:00 - Updated: 2024-11-27 23:00In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuführen, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuführen, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Dell ECS ist ein Objektspeichersystem.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Dell ECS ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-0794 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0794.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-0794 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0794"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2024-141 vom 2024-04-04",
"url": "https://www.dell.com/support/kbdoc/000223839/dsa-2024-="
}
],
"source_lang": "en-US",
"title": "Dell ECS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-27T23:00:00.000+00:00",
"generator": {
"date": "2024-11-28T11:39:04.623+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-0794",
"initial_release_date": "2024-04-04T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-04-04T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-27T23:00:00.000+00:00",
"number": "2",
"summary": "Produktzuordnung \u00fcberpr\u00fcft"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c3.8.1.0",
"product": {
"name": "Dell ECS \u003c3.8.1.0",
"product_id": "T033919"
}
},
{
"category": "product_version",
"name": "3.8.1.0",
"product": {
"name": "Dell ECS 3.8.1.0",
"product_id": "T033919-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:dell:ecs:3.8.1.0"
}
}
}
],
"category": "product_name",
"name": "ECS"
}
],
"category": "vendor",
"name": "Dell"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-18074",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2018-18074"
},
{
"cve": "CVE-2020-10663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10663"
},
{
"cve": "CVE-2020-10672",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10672"
},
{
"cve": "CVE-2020-10673",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10673"
},
{
"cve": "CVE-2020-10735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-10968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10968"
},
{
"cve": "CVE-2020-10969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-10969"
},
{
"cve": "CVE-2020-11111",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11111"
},
{
"cve": "CVE-2020-11112",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11112"
},
{
"cve": "CVE-2020-11113",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11113"
},
{
"cve": "CVE-2020-11612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11612"
},
{
"cve": "CVE-2020-11619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11619"
},
{
"cve": "CVE-2020-11620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11620"
},
{
"cve": "CVE-2020-11979",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-11979"
},
{
"cve": "CVE-2020-12762",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12762"
},
{
"cve": "CVE-2020-12825",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-12825"
},
{
"cve": "CVE-2020-13956",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-14060",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14060"
},
{
"cve": "CVE-2020-14061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14061"
},
{
"cve": "CVE-2020-14062",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14062"
},
{
"cve": "CVE-2020-14195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-14195"
},
{
"cve": "CVE-2020-15250",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-15250"
},
{
"cve": "CVE-2020-1945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1945"
},
{
"cve": "CVE-2020-1967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1967"
},
{
"cve": "CVE-2020-1971",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-1971"
},
{
"cve": "CVE-2020-24616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24616"
},
{
"cve": "CVE-2020-24750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-24750"
},
{
"cve": "CVE-2020-25649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25649"
},
{
"cve": "CVE-2020-25658",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-25658"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-26137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26137"
},
{
"cve": "CVE-2020-26541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-26541"
},
{
"cve": "CVE-2020-27216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27216"
},
{
"cve": "CVE-2020-27218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27218"
},
{
"cve": "CVE-2020-27223",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-27223"
},
{
"cve": "CVE-2020-28366",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28366"
},
{
"cve": "CVE-2020-28493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-28493"
},
{
"cve": "CVE-2020-29509",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29509"
},
{
"cve": "CVE-2020-29511",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29511"
},
{
"cve": "CVE-2020-29582",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29582"
},
{
"cve": "CVE-2020-29651",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-29651"
},
{
"cve": "CVE-2020-35490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35490"
},
{
"cve": "CVE-2020-35491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35491"
},
{
"cve": "CVE-2020-35728",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-35728"
},
{
"cve": "CVE-2020-36179",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36179"
},
{
"cve": "CVE-2020-36180",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36180"
},
{
"cve": "CVE-2020-36181",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36181"
},
{
"cve": "CVE-2020-36182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36182"
},
{
"cve": "CVE-2020-36183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36183"
},
{
"cve": "CVE-2020-36184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36184"
},
{
"cve": "CVE-2020-36185",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36185"
},
{
"cve": "CVE-2020-36186",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36186"
},
{
"cve": "CVE-2020-36187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36187"
},
{
"cve": "CVE-2020-36188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36188"
},
{
"cve": "CVE-2020-36189",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36189"
},
{
"cve": "CVE-2020-36516",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36516"
},
{
"cve": "CVE-2020-36518",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36518"
},
{
"cve": "CVE-2020-36557",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36557"
},
{
"cve": "CVE-2020-36558",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36558"
},
{
"cve": "CVE-2020-36691",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-36691"
},
{
"cve": "CVE-2020-7238",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-7238"
},
{
"cve": "CVE-2020-8840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8840"
},
{
"cve": "CVE-2020-8908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8908"
},
{
"cve": "CVE-2020-8911",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8911"
},
{
"cve": "CVE-2020-8912",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-8912"
},
{
"cve": "CVE-2020-9488",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9488"
},
{
"cve": "CVE-2020-9493",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9493"
},
{
"cve": "CVE-2020-9546",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9546"
},
{
"cve": "CVE-2020-9547",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9547"
},
{
"cve": "CVE-2020-9548",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2020-9548"
},
{
"cve": "CVE-2021-20190",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20190"
},
{
"cve": "CVE-2021-20323",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-20323"
},
{
"cve": "CVE-2021-21290",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21290"
},
{
"cve": "CVE-2021-21295",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21295"
},
{
"cve": "CVE-2021-21409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-21409"
},
{
"cve": "CVE-2021-23840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23840"
},
{
"cve": "CVE-2021-23841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-23841"
},
{
"cve": "CVE-2021-2471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-2471"
},
{
"cve": "CVE-2021-25642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-25642"
},
{
"cve": "CVE-2021-26341",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-26341"
},
{
"cve": "CVE-2021-27918",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-27918"
},
{
"cve": "CVE-2021-28153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28153"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-28861",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-30560",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-3114",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3114"
},
{
"cve": "CVE-2021-33036",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33036"
},
{
"cve": "CVE-2021-33194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33194"
},
{
"cve": "CVE-2021-33195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33195"
},
{
"cve": "CVE-2021-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33196"
},
{
"cve": "CVE-2021-33197",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33197"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-33655",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33655"
},
{
"cve": "CVE-2021-33656",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-33656"
},
{
"cve": "CVE-2021-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3424"
},
{
"cve": "CVE-2021-34428",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-34428"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3530",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3530"
},
{
"cve": "CVE-2021-36221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36221"
},
{
"cve": "CVE-2021-36373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36373"
},
{
"cve": "CVE-2021-36374",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36374"
},
{
"cve": "CVE-2021-3648",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3648"
},
{
"cve": "CVE-2021-36690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-36690"
},
{
"cve": "CVE-2021-3711",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3711"
},
{
"cve": "CVE-2021-3712",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3712"
},
{
"cve": "CVE-2021-37136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37136"
},
{
"cve": "CVE-2021-37137",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37137"
},
{
"cve": "CVE-2021-37404",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37404"
},
{
"cve": "CVE-2021-37533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-37533"
},
{
"cve": "CVE-2021-3754",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3754"
},
{
"cve": "CVE-2021-3778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3778"
},
{
"cve": "CVE-2021-3796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3796"
},
{
"cve": "CVE-2021-3826",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3826"
},
{
"cve": "CVE-2021-3827",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3827"
},
{
"cve": "CVE-2021-38297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-38297"
},
{
"cve": "CVE-2021-3872",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3872"
},
{
"cve": "CVE-2021-3875",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3875"
},
{
"cve": "CVE-2021-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3903"
},
{
"cve": "CVE-2021-3923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3923"
},
{
"cve": "CVE-2021-3927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3927"
},
{
"cve": "CVE-2021-3928",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3928"
},
{
"cve": "CVE-2021-3968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3968"
},
{
"cve": "CVE-2021-3973",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3973"
},
{
"cve": "CVE-2021-3974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3974"
},
{
"cve": "CVE-2021-3984",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-3984"
},
{
"cve": "CVE-2021-4019",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4019"
},
{
"cve": "CVE-2021-4037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4037"
},
{
"cve": "CVE-2021-4069",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4069"
},
{
"cve": "CVE-2021-4104",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4104"
},
{
"cve": "CVE-2021-4136",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4136"
},
{
"cve": "CVE-2021-4157",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4157"
},
{
"cve": "CVE-2021-4166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4166"
},
{
"cve": "CVE-2021-41771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-41771"
},
{
"cve": "CVE-2021-4192",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4192"
},
{
"cve": "CVE-2021-4193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4193"
},
{
"cve": "CVE-2021-4203",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-4203"
},
{
"cve": "CVE-2021-42567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-42567"
},
{
"cve": "CVE-2021-43797",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-43797"
},
{
"cve": "CVE-2021-44531",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44716",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44716"
},
{
"cve": "CVE-2021-44878",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-44878"
},
{
"cve": "CVE-2021-45078",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-45078"
},
{
"cve": "CVE-2021-46195",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46195"
},
{
"cve": "CVE-2021-46828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0128",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0128"
},
{
"cve": "CVE-2022-0213",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0213"
},
{
"cve": "CVE-2022-0225",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0225"
},
{
"cve": "CVE-2022-0261",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0261"
},
{
"cve": "CVE-2022-0318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0318"
},
{
"cve": "CVE-2022-0319",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0319"
},
{
"cve": "CVE-2022-0351",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0351"
},
{
"cve": "CVE-2022-0359",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0359"
},
{
"cve": "CVE-2022-0361",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0361"
},
{
"cve": "CVE-2022-0392",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0392"
},
{
"cve": "CVE-2022-0407",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0407"
},
{
"cve": "CVE-2022-0413",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0413"
},
{
"cve": "CVE-2022-0561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0561"
},
{
"cve": "CVE-2022-0696",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0696"
},
{
"cve": "CVE-2022-0778",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-0778"
},
{
"cve": "CVE-2022-1184",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1184"
},
{
"cve": "CVE-2022-1245",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1245"
},
{
"cve": "CVE-2022-1271",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1292"
},
{
"cve": "CVE-2022-1381",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1381"
},
{
"cve": "CVE-2022-1420",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1420"
},
{
"cve": "CVE-2022-1462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1462"
},
{
"cve": "CVE-2022-1466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1466"
},
{
"cve": "CVE-2022-1471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1471"
},
{
"cve": "CVE-2022-1586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-1616",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1616"
},
{
"cve": "CVE-2022-1619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1619"
},
{
"cve": "CVE-2022-1620",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1620"
},
{
"cve": "CVE-2022-1679",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1679"
},
{
"cve": "CVE-2022-1705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1705"
},
{
"cve": "CVE-2022-1720",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1720"
},
{
"cve": "CVE-2022-1729",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1729"
},
{
"cve": "CVE-2022-1733",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1733"
},
{
"cve": "CVE-2022-1735",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1735"
},
{
"cve": "CVE-2022-1771",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1771"
},
{
"cve": "CVE-2022-1785",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1785"
},
{
"cve": "CVE-2022-1796",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1796"
},
{
"cve": "CVE-2022-1851",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1851"
},
{
"cve": "CVE-2022-1897",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1897"
},
{
"cve": "CVE-2022-1898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1898"
},
{
"cve": "CVE-2022-1927",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1927"
},
{
"cve": "CVE-2022-1962",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1962"
},
{
"cve": "CVE-2022-1968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1968"
},
{
"cve": "CVE-2022-1974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1974"
},
{
"cve": "CVE-2022-1975",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-1975"
},
{
"cve": "CVE-2022-20132",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20132"
},
{
"cve": "CVE-2022-20141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20141"
},
{
"cve": "CVE-2022-20154",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20154"
},
{
"cve": "CVE-2022-20166",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20166"
},
{
"cve": "CVE-2022-20368",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20368"
},
{
"cve": "CVE-2022-20369",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20369"
},
{
"cve": "CVE-2022-2047",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2047"
},
{
"cve": "CVE-2022-2048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2048"
},
{
"cve": "CVE-2022-20567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-20567"
},
{
"cve": "CVE-2022-2068",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2068"
},
{
"cve": "CVE-2022-2097",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21216",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21216"
},
{
"cve": "CVE-2022-21233",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21233"
},
{
"cve": "CVE-2022-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2124"
},
{
"cve": "CVE-2022-2125",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2125"
},
{
"cve": "CVE-2022-2126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2126"
},
{
"cve": "CVE-2022-2129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2129"
},
{
"cve": "CVE-2022-21363",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21363"
},
{
"cve": "CVE-2022-21385",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21385"
},
{
"cve": "CVE-2022-21499",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21499"
},
{
"cve": "CVE-2022-2153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2153"
},
{
"cve": "CVE-2022-21540",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21540"
},
{
"cve": "CVE-2022-21541",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21541"
},
{
"cve": "CVE-2022-21549",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21549"
},
{
"cve": "CVE-2022-21618",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21618"
},
{
"cve": "CVE-2022-21619",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21619"
},
{
"cve": "CVE-2022-21624",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21624"
},
{
"cve": "CVE-2022-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21626"
},
{
"cve": "CVE-2022-21628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21628"
},
{
"cve": "CVE-2022-21702",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-21702"
},
{
"cve": "CVE-2022-2175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2175"
},
{
"cve": "CVE-2022-2182",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2182"
},
{
"cve": "CVE-2022-2183",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2183"
},
{
"cve": "CVE-2022-2206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2206"
},
{
"cve": "CVE-2022-2207",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2207"
},
{
"cve": "CVE-2022-2208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2208"
},
{
"cve": "CVE-2022-2210",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2210"
},
{
"cve": "CVE-2022-2231",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2231"
},
{
"cve": "CVE-2022-2256",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2256"
},
{
"cve": "CVE-2022-2257",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2257"
},
{
"cve": "CVE-2022-2264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2264"
},
{
"cve": "CVE-2022-2284",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2284"
},
{
"cve": "CVE-2022-2285",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2285"
},
{
"cve": "CVE-2022-2286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2286"
},
{
"cve": "CVE-2022-2287",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2287"
},
{
"cve": "CVE-2022-22976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22976"
},
{
"cve": "CVE-2022-22978",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-22978"
},
{
"cve": "CVE-2022-2304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2304"
},
{
"cve": "CVE-2022-2318",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2318"
},
{
"cve": "CVE-2022-23302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23302"
},
{
"cve": "CVE-2022-23305",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23305"
},
{
"cve": "CVE-2022-23307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23307"
},
{
"cve": "CVE-2022-2343",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2343"
},
{
"cve": "CVE-2022-2344",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2344"
},
{
"cve": "CVE-2022-2345",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2345"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23521"
},
{
"cve": "CVE-2022-23772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23772"
},
{
"cve": "CVE-2022-23773",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-23773"
},
{
"cve": "CVE-2022-24302",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24302"
},
{
"cve": "CVE-2022-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24329"
},
{
"cve": "CVE-2022-24823",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24823"
},
{
"cve": "CVE-2022-24903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2503",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2503"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25168",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25168"
},
{
"cve": "CVE-2022-2519",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2519"
},
{
"cve": "CVE-2022-2520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2520"
},
{
"cve": "CVE-2022-2521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2521"
},
{
"cve": "CVE-2022-2522",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2522"
},
{
"cve": "CVE-2022-25647",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25647"
},
{
"cve": "CVE-2022-2571",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2571"
},
{
"cve": "CVE-2022-2580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2580"
},
{
"cve": "CVE-2022-2581",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2581"
},
{
"cve": "CVE-2022-25857",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-25857"
},
{
"cve": "CVE-2022-2588",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2588"
},
{
"cve": "CVE-2022-2598",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2598"
},
{
"cve": "CVE-2022-26148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26148"
},
{
"cve": "CVE-2022-26365",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26365"
},
{
"cve": "CVE-2022-26373",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26373"
},
{
"cve": "CVE-2022-2639",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2639"
},
{
"cve": "CVE-2022-26612",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-26612"
},
{
"cve": "CVE-2022-2663",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2663"
},
{
"cve": "CVE-2022-27781",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27781"
},
{
"cve": "CVE-2022-27782",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27782"
},
{
"cve": "CVE-2022-27943",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-27943"
},
{
"cve": "CVE-2022-2795",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-28131",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28131"
},
{
"cve": "CVE-2022-2816",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2816"
},
{
"cve": "CVE-2022-2817",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2817"
},
{
"cve": "CVE-2022-2819",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2819"
},
{
"cve": "CVE-2022-28327",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28327"
},
{
"cve": "CVE-2022-2845",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2845"
},
{
"cve": "CVE-2022-2849",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2849"
},
{
"cve": "CVE-2022-2862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2862"
},
{
"cve": "CVE-2022-2867",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2867"
},
{
"cve": "CVE-2022-2868",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2868"
},
{
"cve": "CVE-2022-2869",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2869"
},
{
"cve": "CVE-2022-28693",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28693"
},
{
"cve": "CVE-2022-2874",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2874"
},
{
"cve": "CVE-2022-28748",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-28748"
},
{
"cve": "CVE-2022-2880",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-2889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2889"
},
{
"cve": "CVE-2022-29162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29162"
},
{
"cve": "CVE-2022-29187",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29187"
},
{
"cve": "CVE-2022-2923",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2923"
},
{
"cve": "CVE-2022-2946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2946"
},
{
"cve": "CVE-2022-29526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29526"
},
{
"cve": "CVE-2022-29583",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29583"
},
{
"cve": "CVE-2022-2964",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2964"
},
{
"cve": "CVE-2022-2977",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2977"
},
{
"cve": "CVE-2022-2980",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2980"
},
{
"cve": "CVE-2022-2982",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2982"
},
{
"cve": "CVE-2022-29900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2022-2991",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-2991"
},
{
"cve": "CVE-2022-3016",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3016"
},
{
"cve": "CVE-2022-3028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3028"
},
{
"cve": "CVE-2022-3037",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3037"
},
{
"cve": "CVE-2022-30580",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30580"
},
{
"cve": "CVE-2022-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30630"
},
{
"cve": "CVE-2022-30631",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30631"
},
{
"cve": "CVE-2022-30632",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30632"
},
{
"cve": "CVE-2022-30633",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-30633"
},
{
"cve": "CVE-2022-3099",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3099"
},
{
"cve": "CVE-2022-31030",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31030"
},
{
"cve": "CVE-2022-31159",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31159"
},
{
"cve": "CVE-2022-3134",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3134"
},
{
"cve": "CVE-2022-3153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3153"
},
{
"cve": "CVE-2022-3169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3169"
},
{
"cve": "CVE-2022-31690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-31690"
},
{
"cve": "CVE-2022-32148",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32148"
},
{
"cve": "CVE-2022-32149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32149"
},
{
"cve": "CVE-2022-32206",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32206"
},
{
"cve": "CVE-2022-32208",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32208"
},
{
"cve": "CVE-2022-32221",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-32221"
},
{
"cve": "CVE-2022-3234",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3234"
},
{
"cve": "CVE-2022-3235",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3235"
},
{
"cve": "CVE-2022-3239",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3239"
},
{
"cve": "CVE-2022-3278",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3278"
},
{
"cve": "CVE-2022-3296",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3296"
},
{
"cve": "CVE-2022-3297",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3297"
},
{
"cve": "CVE-2022-33196",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33196"
},
{
"cve": "CVE-2022-3324",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3324"
},
{
"cve": "CVE-2022-3352",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3352"
},
{
"cve": "CVE-2022-33740",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33740"
},
{
"cve": "CVE-2022-33741",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33741"
},
{
"cve": "CVE-2022-33742",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33742"
},
{
"cve": "CVE-2022-33972",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33972"
},
{
"cve": "CVE-2022-33981",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-33981"
},
{
"cve": "CVE-2022-34169",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34169"
},
{
"cve": "CVE-2022-3424",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3424"
},
{
"cve": "CVE-2022-34266",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34266"
},
{
"cve": "CVE-2022-34526",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34526"
},
{
"cve": "CVE-2022-34903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3491",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3491"
},
{
"cve": "CVE-2022-3515",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3520",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3520"
},
{
"cve": "CVE-2022-3521",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3521"
},
{
"cve": "CVE-2022-3524",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3524"
},
{
"cve": "CVE-2022-35252",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35252"
},
{
"cve": "CVE-2022-3542",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3542"
},
{
"cve": "CVE-2022-3545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3545"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-3565",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3565"
},
{
"cve": "CVE-2022-3566",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3566"
},
{
"cve": "CVE-2022-3567",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3567"
},
{
"cve": "CVE-2022-35737",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-3586",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3586"
},
{
"cve": "CVE-2022-3591",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3591"
},
{
"cve": "CVE-2022-3594",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3594"
},
{
"cve": "CVE-2022-3597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3597"
},
{
"cve": "CVE-2022-3599",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3599"
},
{
"cve": "CVE-2022-36109",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36109"
},
{
"cve": "CVE-2022-3621",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3621"
},
{
"cve": "CVE-2022-3626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3626"
},
{
"cve": "CVE-2022-3627",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3627"
},
{
"cve": "CVE-2022-3628",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3628"
},
{
"cve": "CVE-2022-36280",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36280"
},
{
"cve": "CVE-2022-3629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3629"
},
{
"cve": "CVE-2022-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3635"
},
{
"cve": "CVE-2022-3643",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3643"
},
{
"cve": "CVE-2022-36437",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36437"
},
{
"cve": "CVE-2022-3646",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3646"
},
{
"cve": "CVE-2022-3649",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3649"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-36879",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36879"
},
{
"cve": "CVE-2022-36946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-36946"
},
{
"cve": "CVE-2022-3705",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3705"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-37865",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37865"
},
{
"cve": "CVE-2022-37866",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-37866"
},
{
"cve": "CVE-2022-38090",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38090"
},
{
"cve": "CVE-2022-38096",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38096"
},
{
"cve": "CVE-2022-38126",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38126"
},
{
"cve": "CVE-2022-38127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38127"
},
{
"cve": "CVE-2022-38177",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38177"
},
{
"cve": "CVE-2022-38178",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38178"
},
{
"cve": "CVE-2022-3821",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38533"
},
{
"cve": "CVE-2022-38749",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38749"
},
{
"cve": "CVE-2022-38750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38750"
},
{
"cve": "CVE-2022-38751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38751"
},
{
"cve": "CVE-2022-38752",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-38752"
},
{
"cve": "CVE-2022-39028",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39028"
},
{
"cve": "CVE-2022-3903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3903"
},
{
"cve": "CVE-2022-39188",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39188"
},
{
"cve": "CVE-2022-39399",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-39399"
},
{
"cve": "CVE-2022-3970",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-3970"
},
{
"cve": "CVE-2022-40149",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40149"
},
{
"cve": "CVE-2022-40150",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2022-40151",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40151"
},
{
"cve": "CVE-2022-40152",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40152"
},
{
"cve": "CVE-2022-40153",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40153"
},
{
"cve": "CVE-2022-40303",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40307",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40307"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-40768",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40768"
},
{
"cve": "CVE-2022-40899",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-40899"
},
{
"cve": "CVE-2022-4095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4095"
},
{
"cve": "CVE-2022-41218",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41218"
},
{
"cve": "CVE-2022-4129",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4129"
},
{
"cve": "CVE-2022-4141",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4141"
},
{
"cve": "CVE-2022-41717",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41721",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41721"
},
{
"cve": "CVE-2022-41848",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41848"
},
{
"cve": "CVE-2022-41850",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41850"
},
{
"cve": "CVE-2022-41854",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41854"
},
{
"cve": "CVE-2022-41858",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41858"
},
{
"cve": "CVE-2022-41881",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41881"
},
{
"cve": "CVE-2022-41903",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41903"
},
{
"cve": "CVE-2022-41915",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41915"
},
{
"cve": "CVE-2022-41966",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41966"
},
{
"cve": "CVE-2022-41974",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-41974"
},
{
"cve": "CVE-2022-42003",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42003"
},
{
"cve": "CVE-2022-42004",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42004"
},
{
"cve": "CVE-2022-42010",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42328"
},
{
"cve": "CVE-2022-42329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42329"
},
{
"cve": "CVE-2022-42703",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42703"
},
{
"cve": "CVE-2022-42889",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42889"
},
{
"cve": "CVE-2022-42895",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42895"
},
{
"cve": "CVE-2022-42896",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42896"
},
{
"cve": "CVE-2022-42898",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-4292",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4292"
},
{
"cve": "CVE-2022-4293",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4293"
},
{
"cve": "CVE-2022-42969",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-42969"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-43552",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-43680",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-43750",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43750"
},
{
"cve": "CVE-2022-4378",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4378"
},
{
"cve": "CVE-2022-43945",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43945"
},
{
"cve": "CVE-2022-43995",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-43995"
},
{
"cve": "CVE-2022-4415",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-44638",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-44638"
},
{
"cve": "CVE-2022-45061",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45688",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45688"
},
{
"cve": "CVE-2022-45884",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45884"
},
{
"cve": "CVE-2022-45885",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45885"
},
{
"cve": "CVE-2022-45886",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45886"
},
{
"cve": "CVE-2022-45887",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45887"
},
{
"cve": "CVE-2022-45919",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45919"
},
{
"cve": "CVE-2022-45934",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45934"
},
{
"cve": "CVE-2022-45939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-45939"
},
{
"cve": "CVE-2022-4662",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-4662"
},
{
"cve": "CVE-2022-46751",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46751"
},
{
"cve": "CVE-2022-46908",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-47629",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-47929",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-47929"
},
{
"cve": "CVE-2022-48281",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48281"
},
{
"cve": "CVE-2022-48337",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48339",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0045",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0045"
},
{
"cve": "CVE-2023-0049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0049"
},
{
"cve": "CVE-2023-0051",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0051"
},
{
"cve": "CVE-2023-0054",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0054"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0288",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0288"
},
{
"cve": "CVE-2023-0433",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0433"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0512",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0512"
},
{
"cve": "CVE-2023-0590",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0590"
},
{
"cve": "CVE-2023-0597",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0597"
},
{
"cve": "CVE-2023-0833",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-0833"
},
{
"cve": "CVE-2023-1076",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1076"
},
{
"cve": "CVE-2023-1095",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1095"
},
{
"cve": "CVE-2023-1118",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1118"
},
{
"cve": "CVE-2023-1127",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1127"
},
{
"cve": "CVE-2023-1170",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1170"
},
{
"cve": "CVE-2023-1175",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1175"
},
{
"cve": "CVE-2023-1370",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1370"
},
{
"cve": "CVE-2023-1380",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1380"
},
{
"cve": "CVE-2023-1390",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1390"
},
{
"cve": "CVE-2023-1436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1436"
},
{
"cve": "CVE-2023-1513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1513"
},
{
"cve": "CVE-2023-1611",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1611"
},
{
"cve": "CVE-2023-1670",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1670"
},
{
"cve": "CVE-2023-1855",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1855"
},
{
"cve": "CVE-2023-1989",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1989"
},
{
"cve": "CVE-2023-1990",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1990"
},
{
"cve": "CVE-2023-1998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-1998"
},
{
"cve": "CVE-2023-20862",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-20862"
},
{
"cve": "CVE-2023-2124",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2124"
},
{
"cve": "CVE-2023-2162",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2162"
},
{
"cve": "CVE-2023-2176",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2176"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21835",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21835"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21930",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21930"
},
{
"cve": "CVE-2023-21937",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21937"
},
{
"cve": "CVE-2023-21938",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21938"
},
{
"cve": "CVE-2023-21939",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21939"
},
{
"cve": "CVE-2023-2194",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2194"
},
{
"cve": "CVE-2023-21954",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21954"
},
{
"cve": "CVE-2023-21967",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21967"
},
{
"cve": "CVE-2023-21968",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-21968"
},
{
"cve": "CVE-2023-22490",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22490"
},
{
"cve": "CVE-2023-2253",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2253"
},
{
"cve": "CVE-2023-22809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-23454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23454"
},
{
"cve": "CVE-2023-23455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23455"
},
{
"cve": "CVE-2023-23559",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23559"
},
{
"cve": "CVE-2023-23916",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23916"
},
{
"cve": "CVE-2023-23946",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-23946"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-24532",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-2483",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2483"
},
{
"cve": "CVE-2023-24998",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-2513",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2513"
},
{
"cve": "CVE-2023-25193",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25809",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25809"
},
{
"cve": "CVE-2023-25815",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26048",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26048"
},
{
"cve": "CVE-2023-26049",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26049"
},
{
"cve": "CVE-2023-2650",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2650"
},
{
"cve": "CVE-2023-26545",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26545"
},
{
"cve": "CVE-2023-26604",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-26604"
},
{
"cve": "CVE-2023-27533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27533"
},
{
"cve": "CVE-2023-27534",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27534"
},
{
"cve": "CVE-2023-27535",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27535"
},
{
"cve": "CVE-2023-27536",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27536"
},
{
"cve": "CVE-2023-27538",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27538"
},
{
"cve": "CVE-2023-27561",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-27561"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28320",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28320"
},
{
"cve": "CVE-2023-28321",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28321"
},
{
"cve": "CVE-2023-28322",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28322"
},
{
"cve": "CVE-2023-28328",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28328"
},
{
"cve": "CVE-2023-28464",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28464"
},
{
"cve": "CVE-2023-28486",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28642"
},
{
"cve": "CVE-2023-28772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28772"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-29007",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29383",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29383"
},
{
"cve": "CVE-2023-29402",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29402"
},
{
"cve": "CVE-2023-29406",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29406"
},
{
"cve": "CVE-2023-29409",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-29409"
},
{
"cve": "CVE-2023-2976",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-30772",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-30772"
},
{
"cve": "CVE-2023-31084",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31084"
},
{
"cve": "CVE-2023-3138",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3138"
},
{
"cve": "CVE-2023-31436",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31436"
},
{
"cve": "CVE-2023-31484",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-31484"
},
{
"cve": "CVE-2023-32269",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32269"
},
{
"cve": "CVE-2023-32697",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-32697"
},
{
"cve": "CVE-2023-33264",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-33264"
},
{
"cve": "CVE-2023-34034",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34034"
},
{
"cve": "CVE-2023-34035",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34035"
},
{
"cve": "CVE-2023-34453",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34453"
},
{
"cve": "CVE-2023-34454",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34454"
},
{
"cve": "CVE-2023-34455",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34455"
},
{
"cve": "CVE-2023-34462",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-34462"
},
{
"cve": "CVE-2023-35116",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-35116"
},
{
"cve": "CVE-2023-3635",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-3635"
},
{
"cve": "CVE-2023-36479",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-36479"
},
{
"cve": "CVE-2023-39533",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-39533"
},
{
"cve": "CVE-2023-40167",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40167"
},
{
"cve": "CVE-2023-40217",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-41105",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41105"
},
{
"cve": "CVE-2023-41900",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-41900"
},
{
"cve": "CVE-2023-43642",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43642"
},
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-21626",
"notes": [
{
"category": "description",
"text": "In Dell ECS existieren mehrere Schwachstellen. Diese bestehen in diversen Komponenten von Drittanbietern. Ein Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode mit Administratorrechten auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren."
}
],
"product_status": {
"known_affected": [
"T033919"
]
},
"release_date": "2024-04-04T22:00:00.000+00:00",
"title": "CVE-2024-21626"
}
]
}
WID-SEC-W-2024-1815
Vulnerability from csaf_certbund - Published: 2024-08-12 22:00 - Updated: 2024-08-12 22:00Es besteht eine Schwachstelle in IBM VIOS und IBM AIX. Dieser Fehler besteht in der Komponente urllib3 aufgrund einer unsachgemäßen Behandlung von HTTP-Umleitungen in urllib3, bei der der HTTP-Anfragekörper nicht entfernt wird, wenn eine Umleitungsantwort mit Status 303 verarbeitet wird. Durch Senden einer speziell gestalteten HTTP-Anfrage kann ein Angreifer aus einem angrenzenden Netzwerk diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.
Es besteht eine Schwachstelle in IBM VIOS und IBM AIX. Dieser Fehler besteht in den pypa/setuptools aufgrund eines Fehlers im package_index-Modul. Indem ein Benutzer dazu gebracht wird, auf eine speziell gestaltete URL zu klicken, kann ein entfernter, anonymer Angreifer diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion.
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Virtual I/O Server (VIOS) bietet Virtualisierungsfunktionen.\r\nAIX ist ein Unix Betriebssystem von IBM.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter Angreifer oder ein Angreifer aus einem angrenzenden Netzwerk kann mehrere Schwachstellen in IBM VIOS und IBM AIX ausnutzen, um Informationen offenzulegen oder um beliebigen Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1815 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1815.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1815 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1815"
},
{
"category": "external",
"summary": "IBM Security Advisory vom 2024-08-12",
"url": "https://aix.software.ibm.com/aix/efixes/security/python_advisory11.asc"
},
{
"category": "external",
"summary": "IBM Security Bulletin vom 2024-08-12",
"url": "https://www.ibm.com/support/pages/node/7165344"
}
],
"source_lang": "en-US",
"title": "IBM VIOS und AIX: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-08-12T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T18:12:10.538+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2024-1815",
"initial_release_date": "2024-08-12T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-12T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "T036728",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "T036727",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in IBM VIOS und IBM AIX. Dieser Fehler besteht in der Komponente urllib3 aufgrund einer unsachgem\u00e4\u00dfen Behandlung von HTTP-Umleitungen in urllib3, bei der der HTTP-Anfragek\u00f6rper nicht entfernt wird, wenn eine Umleitungsantwort mit Status 303 verarbeitet wird. Durch Senden einer speziell gestalteten HTTP-Anfrage kann ein Angreifer aus einem angrenzenden Netzwerk diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T036727",
"T036728"
]
},
"release_date": "2024-08-12T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-6345",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in IBM VIOS und IBM AIX. Dieser Fehler besteht in den pypa/setuptools aufgrund eines Fehlers im package_index-Modul. Indem ein Benutzer dazu gebracht wird, auf eine speziell gestaltete URL zu klicken, kann ein entfernter, anonymer Angreifer diese Schwachstelle zur Ausf\u00fchrung von beliebigem Code ausnutzen. Eine erfolgreiche Ausnutzung erfordert eine Benutzerinteraktion."
}
],
"product_status": {
"known_affected": [
"T036727",
"T036728"
]
},
"release_date": "2024-08-12T22:00:00.000+00:00",
"title": "CVE-2024-6345"
}
]
}
WID-SEC-W-2024-3731
Vulnerability from csaf_certbund - Published: 2024-12-18 23:00 - Updated: 2024-12-18 23:00Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die urllib3-Bibliothek aufgrund der unsachgemäßen Behandlung vertraulicher Informationen während HTTP-Umleitungen und der mangelnden Kontrolle über vom Benutzer bereitgestellte Header und Cookies. Ein Angreifer mit erhöhten Rechten kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben.
Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die urllib3-Bibliothek aufgrund der unsachgemäßen Behandlung vertraulicher Informationen während HTTP-Umleitungen und der mangelnden Kontrolle über vom Benutzer bereitgestellte Header und Cookies. Ein Angreifer mit erhöhten Rechten kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben.
Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die urllib3-Bibliothek aufgrund der unsachgemäßen Behandlung vertraulicher Informationen während HTTP-Umleitungen und der mangelnden Kontrolle über vom Benutzer bereitgestellte Header und Cookies. Ein Angreifer mit erhöhten Rechten kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben.
Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die Python-Anforderungsbibliothek aufgrund einer unsachgemäßen Header-Behandlung bei Umleitungen und unsicheren Validierungseinstellungen. Ein Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben und Sicherheitsmaßnahmen zu umgehen. Für eine erfolgreiche Ausnutzung ist eine Benutzerinteraktion erforderlich.
Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die Python-Anforderungsbibliothek aufgrund einer unsachgemäßen Header-Behandlung bei Umleitungen und unsicheren Validierungseinstellungen. Ein Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben und Sicherheitsmaßnahmen zu umgehen. Für eine erfolgreiche Ausnutzung ist eine Benutzerinteraktion erforderlich.
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM Sterling Connect:Direct ist ein Managed-File-Transfer-Produkt.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM Sterling Connect: Direct Web Service ausnutzen, um Informationen offenzulegen und Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3731 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3731.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3731 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3731"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7179465 vom 2024-12-18",
"url": "https://www.ibm.com/support/pages/node/7179465"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7179466 vom 2024-12-18",
"url": "https://www.ibm.com/support/pages/node/7179466"
}
],
"source_lang": "en-US",
"title": "IBM Sterling Connect: Direct Web Service: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-12-18T23:00:00.000+00:00",
"generator": {
"date": "2024-12-19T10:12:17.509+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-3731",
"initial_release_date": "2024-12-18T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-18T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.3.0.11_ifix001",
"product": {
"name": "IBM Sterling Connect:Direct \u003c6.3.0.11_ifix001",
"product_id": "T039941"
}
},
{
"category": "product_version",
"name": "6.3.0.11_ifix001",
"product": {
"name": "IBM Sterling Connect:Direct 6.3.0.11_ifix001",
"product_id": "T039941-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:sterling_connect%3adirect:6.3.0.11_ifix001"
}
}
}
],
"category": "product_name",
"name": "Sterling Connect:Direct"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-43804",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die urllib3-Bibliothek aufgrund der unsachgem\u00e4\u00dfen Behandlung vertraulicher Informationen w\u00e4hrend HTTP-Umleitungen und der mangelnden Kontrolle \u00fcber vom Benutzer bereitgestellte Header und Cookies. Ein Angreifer mit erh\u00f6hten Rechten kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben."
}
],
"product_status": {
"known_affected": [
"T039941"
]
},
"release_date": "2024-12-18T23:00:00.000+00:00",
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-45803",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die urllib3-Bibliothek aufgrund der unsachgem\u00e4\u00dfen Behandlung vertraulicher Informationen w\u00e4hrend HTTP-Umleitungen und der mangelnden Kontrolle \u00fcber vom Benutzer bereitgestellte Header und Cookies. Ein Angreifer mit erh\u00f6hten Rechten kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben."
}
],
"product_status": {
"known_affected": [
"T039941"
]
},
"release_date": "2024-12-18T23:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-37891",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die urllib3-Bibliothek aufgrund der unsachgem\u00e4\u00dfen Behandlung vertraulicher Informationen w\u00e4hrend HTTP-Umleitungen und der mangelnden Kontrolle \u00fcber vom Benutzer bereitgestellte Header und Cookies. Ein Angreifer mit erh\u00f6hten Rechten kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben."
}
],
"product_status": {
"known_affected": [
"T039941"
]
},
"release_date": "2024-12-18T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2023-32681",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die Python-Anforderungsbibliothek aufgrund einer unsachgem\u00e4\u00dfen Header-Behandlung bei Umleitungen und unsicheren Validierungseinstellungen. Ein Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben und Sicherheitsma\u00dfnahmen zu umgehen. F\u00fcr eine erfolgreiche Ausnutzung ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039941"
]
},
"release_date": "2024-12-18T23:00:00.000+00:00",
"title": "CVE-2023-32681"
},
{
"cve": "CVE-2024-35195",
"notes": [
{
"category": "description",
"text": "Es bestehen mehrere Schwachstellen in IBM Sterling Connect:Direct Web Service. Diese Schwachstellen betreffen die Python-Anforderungsbibliothek aufgrund einer unsachgem\u00e4\u00dfen Header-Behandlung bei Umleitungen und unsicheren Validierungseinstellungen. Ein Angreifer kann diese Schwachstellen ausnutzen, um vertrauliche Informationen preiszugeben und Sicherheitsma\u00dfnahmen zu umgehen. F\u00fcr eine erfolgreiche Ausnutzung ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T039941"
]
},
"release_date": "2024-12-18T23:00:00.000+00:00",
"title": "CVE-2024-35195"
}
]
}
WID-SEC-W-2024-1003
Vulnerability from csaf_certbund - Published: 2024-05-01 22:00 - Updated: 2025-09-16 22:00| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial-of-Service-Zustand herbeizuf\u00fchren, beliebigen Code auszuf\u00fchren, vertrauliche Informationen offenzulegen, Dateien zu manipulieren, Cross-Site Scripting (XSS)-Angriffe durchzuf\u00fchren oder einen Men-in-the-Middle-Angriff auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1003 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1003.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1003 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1003"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-05-01",
"url": "https://access.redhat.com/errata/RHSA-2024:2119"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-05-01",
"url": "https://access.redhat.com/errata/RHSA-2024:2132"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-05-01",
"url": "https://access.redhat.com/errata/RHSA-2024:2437"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-05-01",
"url": "https://access.redhat.com/errata/RHSA-2024:2559"
},
{
"category": "external",
"summary": "RedHat Security Advisory vom 2024-05-01",
"url": "https://access.redhat.com/errata/"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2559 vom 2024-05-07",
"url": "https://linux.oracle.com/errata/ELSA-2024-2559.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2566 vom 2024-05-09",
"url": "https://linux.oracle.com/errata/ELSA-2024-2566.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2988 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2988"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2968 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2968"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2961 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2961"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2952 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2952"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3102 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3102"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2987"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3267 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3267"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3264 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3264"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3321 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3321"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3322 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3322"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3323 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3324 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3324"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3325 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3325"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2987 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2987.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3392 vom 2024-05-28",
"url": "https://access.redhat.com/errata/RHSA-2024:3392"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-2961 vom 2024-05-28",
"url": "https://linux.oracle.com/errata/ELSA-2024-2961.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-3264 vom 2024-05-30",
"url": "http://linux.oracle.com/errata/ELSA-2024-3264.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-3267 vom 2024-06-01",
"url": "https://linux.oracle.com/errata/ELSA-2024-3267.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4522 vom 2024-07-12",
"url": "https://access.redhat.com/errata/RHSA-2024:4522"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3976-1 vom 2024-11-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-November/019809.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11189 vom 2024-12-17",
"url": "https://access.redhat.com/errata/RHSA-2024:11189"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11238 vom 2024-12-17",
"url": "https://access.redhat.com/errata/RHSA-2024:11238"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-11238 vom 2024-12-19",
"url": "https://linux.oracle.com/errata/ELSA-2024-11238.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0078 vom 2025-01-08",
"url": "https://access.redhat.com/errata/RHSA-2025:0078"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1793 vom 2025-02-25",
"url": "https://access.redhat.com/errata/RHSA-2025:1793"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1813 vom 2025-02-25",
"url": "https://access.redhat.com/errata/RHSA-2025:1813"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2763 vom 2025-02-25",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2763.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7230557 vom 2025-04-10",
"url": "https://www.ibm.com/support/pages/node/7230557"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7240431"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:03233-1 vom 2025-09-16",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZZVWJEPKVYRNPHIHU4HAZXJJSW7AFWHY/"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-09-16T22:00:00.000+00:00",
"generator": {
"date": "2025-09-17T08:06:13.454+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1003",
"initial_release_date": "2024-05-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-07T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-09T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-22T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-28T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-06-02T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-07-11T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-19T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-01-07T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-24T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-09-16T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
}
],
"status": "final",
"version": "18"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "product_name",
"name": "MQ"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.17",
"product_id": "T042730"
}
},
{
"category": "product_version",
"name": "10.1.17",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.17",
"product_id": "T042730-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.17"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version_range",
"name": "\u003c9",
"product": {
"name": "Red Hat Enterprise Linux \u003c9",
"product_id": "T030284"
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T030284-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"product_status": {
"known_affected": [
"T042730",
"T002207",
"67646",
"398363",
"T036688",
"T004914",
"T030284"
]
},
"release_date": "2024-05-01T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2024-28102",
"product_status": {
"known_affected": [
"T042730",
"T002207",
"67646",
"398363",
"T036688",
"T004914",
"T030284"
]
},
"release_date": "2024-05-01T22:00:00.000+00:00",
"title": "CVE-2024-28102"
},
{
"cve": "CVE-2023-52323",
"product_status": {
"known_affected": [
"T042730",
"T002207",
"67646",
"398363",
"T036688",
"T004914",
"T030284"
]
},
"release_date": "2024-05-01T22:00:00.000+00:00",
"title": "CVE-2023-52323"
},
{
"cve": "CVE-2024-22195",
"product_status": {
"known_affected": [
"T042730",
"T002207",
"67646",
"398363",
"T036688",
"T004914",
"T030284"
]
},
"release_date": "2024-05-01T22:00:00.000+00:00",
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-3019",
"product_status": {
"known_affected": [
"T042730",
"T002207",
"67646",
"398363",
"T036688",
"T004914",
"T030284"
]
},
"release_date": "2024-05-01T22:00:00.000+00:00",
"title": "CVE-2024-3019"
},
{
"cve": "CVE-2023-45897",
"product_status": {
"known_affected": [
"T042730",
"T002207",
"67646",
"398363",
"T036688",
"T004914",
"T030284"
]
},
"release_date": "2024-05-01T22:00:00.000+00:00",
"title": "CVE-2023-45897"
},
{
"cve": "CVE-2024-2307",
"product_status": {
"known_affected": [
"T042730",
"T002207",
"67646",
"398363",
"T036688",
"T004914",
"T030284"
]
},
"release_date": "2024-05-01T22:00:00.000+00:00",
"title": "CVE-2024-2307"
}
]
}
WID-SEC-W-2024-1228
Vulnerability from csaf_certbund - Published: 2024-05-22 22:00 - Updated: 2025-07-24 22:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenStack ist eine Sammlung von Diensten, um Cloud-Computing in Form von Infrastructure as a Service (IaaS) bereitstellen zu k\u00f6nnen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenStack ausnutzen, um Sicherheitsma\u00dfnahmen zu umgehen, eine Denial-of-Service-Zustand zu erzeugen, um vertrauliche Informationen offenzulegen und Daten zu \u00e4ndern.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1228 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1228.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1228 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1228"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2727 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2727"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2729 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2729"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2730 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2730"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2767 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2767"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2731 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2731"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2732 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2732"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2733 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2733"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2734 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2734"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2735 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2735"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2768 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2768"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2736 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2736"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2770 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2770"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2737 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2737"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2769 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2769"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3352 vom 2024-05-23",
"url": "https://access.redhat.com/errata/RHSA-2024:3352"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3327 vom 2024-05-29",
"url": "https://access.redhat.com/errata/RHSA-2024:3327"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3331 vom 2024-05-30",
"url": "https://access.redhat.com/errata/RHSA-2024:3331"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3467 vom 2024-05-29",
"url": "https://access.redhat.com/errata/RHSA-2024:3467"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3713 vom 2024-06-12",
"url": "https://access.redhat.com/errata/RHSA-2024:3713"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4054 vom 2024-06-24",
"url": "https://access.redhat.com/errata/RHSA-2024:4054"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7987 vom 2024-10-10",
"url": "https://access.redhat.com/errata/RHSA-2024:7987"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8688 vom 2024-11-06",
"url": "https://access.redhat.com/errata/RHSA-2024:8688"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8692 vom 2024-11-07",
"url": "https://access.redhat.com/errata/RHSA-2024:8692"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10142 vom 2024-11-26",
"url": "https://access.redhat.com/errata/RHSA-2024:10142"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:0832 vom 2025-02-06",
"url": "https://access.redhat.com/errata/RHSA-2025:0832"
},
{
"category": "external",
"summary": "IBM Security Bulletin",
"url": "https://www.ibm.com/support/pages/node/7240431"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenStack: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-24T22:00:00.000+00:00",
"generator": {
"date": "2025-07-25T07:16:56.800+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1228",
"initial_release_date": "2024-05-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-05-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-05-23T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-30T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-11T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-23T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-10T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-25T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-02-05T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-24T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "product_name",
"name": "MQ"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.39",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.39",
"product_id": "T039437"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.39",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.39",
"product_id": "T039437-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.39"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.72",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.72",
"product_id": "T040822"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.72",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.72",
"product_id": "T040822-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.72"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "16.2",
"product": {
"name": "Red Hat OpenStack 16.2",
"product_id": "T023999",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:16.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c17.1",
"product": {
"name": "Red Hat OpenStack \u003c17.1",
"product_id": "T031314"
}
},
{
"category": "product_version",
"name": "17.1",
"product": {
"name": "Red Hat OpenStack 17.1",
"product_id": "T031314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openstack:17.1"
}
}
}
],
"category": "product_name",
"name": "OpenStack"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-1135",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1135"
},
{
"cve": "CVE-2023-39325",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39325"
},
{
"cve": "CVE-2023-44487",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45288",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45288"
},
{
"cve": "CVE-2024-4438",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-4438"
},
{
"cve": "CVE-2023-39326",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-39326"
},
{
"cve": "CVE-2023-45287",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45287"
},
{
"cve": "CVE-2024-1394",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1394"
},
{
"cve": "CVE-2024-24680",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-24680"
},
{
"cve": "CVE-2024-1141",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-1141"
},
{
"cve": "CVE-2023-45803",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2023-48795",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-6725",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6725"
},
{
"cve": "CVE-2023-6110",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2023-6110"
},
{
"cve": "CVE-2024-22195",
"product_status": {
"known_affected": [
"T023999",
"67646",
"T031314",
"T040822",
"T036688",
"T039437"
]
},
"release_date": "2024-05-22T22:00:00.000+00:00",
"title": "CVE-2024-22195"
}
]
}
alsa-2024:2968
Vulnerability from osv_almalinux
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
- urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
- pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)
- jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-aliyun"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-all"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-amt-ws"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-apc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-apc-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-aws"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-azure-arm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-bladecenter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-brocade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-cisco-mds"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-cisco-ucs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-compute"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-drac5"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-eaton-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-emerson"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-eps"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-gce"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-heuristics-ping"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-hpblade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ibm-powervs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ibm-vpc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ibmblade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ifmib"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo-moonshot"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo-mp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo-ssh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ilo2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-intelmodular"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ipdu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-ipmilan"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-kdump"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-kubevirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-lpar"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-mpath"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-openstack"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-redfish"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-rhevm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-rsa"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-rsb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-sbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-scsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-virsh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-vmware-rest"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-vmware-soap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-wti"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "fence-agents-zvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.2.1-129.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)\n* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2024:2968",
"modified": "2024-05-29T14:51:26Z",
"published": "2024-05-22T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:2968"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52323"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-22195"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246840"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2257028"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2257854"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-2968.html"
}
],
"related": [
"CVE-2023-45803",
"CVE-2023-52323",
"CVE-2024-22195"
],
"summary": "Moderate: fence-agents security and bug fix update"
}
alsa-2024:2132
Vulnerability from osv_almalinux
The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster.
Security Fix(es):
- urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
- pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)
- jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-aliyun"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-all"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-amt-ws"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-apc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-apc-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-aws"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-azure-arm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-bladecenter"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-brocade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-cisco-mds"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-cisco-ucs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-compute"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-drac5"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-eaton-snmp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-emerson"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-eps"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-gce"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-heuristics-ping"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-hpblade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ibm-powervs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ibm-vpc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ibmblade"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ifmib"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ilo-moonshot"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ilo-mp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ilo-ssh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ilo2"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-intelmodular"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ipdu"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-ipmilan"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-kdump"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-kubevirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-lpar"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-mpath"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-openstack"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-redfish"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-rhevm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-rsa"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-rsb"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-sbd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-scsi"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-virsh"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-vmware-rest"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-vmware-soap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-wti"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-agents-zvm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-virt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-virtd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-virtd-cpg"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-virtd-libvirt"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-virtd-multicast"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-virtd-serial"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "fence-virtd-tcp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "ha-cloud-support"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.10.0-62.el9"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The fence-agents packages provide a collection of scripts for handling remote power management for cluster devices. They allow failed or unreachable nodes to be forcibly restarted and removed from the cluster. \n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)\n* jinja2: HTML attribute injection when passing user input as keys to xmlattr filter (CVE-2024-22195)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2024:2132",
"modified": "2024-05-07T15:14:09Z",
"published": "2024-04-30T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:2132"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52323"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2024-22195"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246840"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2257028"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2257854"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-2132.html"
}
],
"related": [
"CVE-2023-45803",
"CVE-2023-52323",
"CVE-2024-22195"
],
"summary": "Moderate: fence-agents security and bug fix update"
}
alsa-2024:2952
Vulnerability from osv_almalinux
The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.
Security Fix(es):
- urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
- pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
| URL | Type | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents-aliyun"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents-gcp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "resource-agents-paf"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4.9.0-54.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The resource-agents packages provide the Pacemaker and RGManager service managers with a set of scripts. These scripts interface with several services to allow operating in a high-availability (HA) environment.\n\nSecurity Fix(es):\n\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n* pycryptodome: side-channel leakage for OAEP decryption in PyCryptodome and pycryptodomex (CVE-2023-52323)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2024:2952",
"modified": "2024-05-29T14:41:52Z",
"published": "2024-05-22T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:2952"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-52323"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246840"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2257028"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-2952.html"
}
],
"related": [
"CVE-2023-45803",
"CVE-2023-52323"
],
"summary": "Moderate: resource-agents security and bug fix update"
}
alsa-2024:0464
Vulnerability from osv_almalinux
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
- python-urllib3: Cookie request header isn't stripped during cross-origin redirects (CVE-2023-43804)
- urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.5-3.el9_3.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:0464",
"modified": "2024-01-25T21:46:05Z",
"published": "2024-01-25T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:0464"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2242493"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246840"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-0464.html"
}
],
"related": [
"CVE-2023-43804",
"CVE-2023-45803"
],
"summary": "Moderate: python-urllib3 security update"
}
alsa-2024:11238
Vulnerability from osv_almalinux
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
- urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3.11-urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.12-2.el9_5.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. \n\nSecurity Fix(es): \n\n * urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2024:11238",
"modified": "2024-12-23T08:22:56Z",
"published": "2024-12-17T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:11238"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246840"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-11238.html"
}
],
"related": [
"CVE-2023-45803"
],
"summary": "Moderate: python3.11-urllib3 security update"
}
alsa-2024:0116
Vulnerability from osv_almalinux
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
- python-urllib3: Cookie request header isn't stripped during cross-origin redirects (CVE-2023-43804)
- urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3-urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.24.2-5.el8_9.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.\n\nSecurity Fix(es):\n\n* python-urllib3: Cookie request header isn\u0027t stripped during cross-origin redirects (CVE-2023-43804)\n* urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2024:0116",
"modified": "2024-01-16T17:20:14Z",
"published": "2024-01-10T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:0116"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-43804"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2242493"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246840"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-0116.html"
}
],
"related": [
"CVE-2023-43804",
"CVE-2023-45803"
],
"summary": "Moderate: python-urllib3 security update"
}
alsa-2024:11189
Vulnerability from osv_almalinux
The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities.
Security Fix(es):
- urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "python3.11-urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "1.26.12-5.el8_10"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The python-urllib3 package provides the Python HTTP module with connection pooling and file POST abilities. \n\nSecurity Fix(es): \n\n * urllib3: Request body not stripped after redirect from 303 status changes request method to GET (CVE-2023-45803)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n",
"id": "ALSA-2024:11189",
"modified": "2024-12-18T12:47:55Z",
"published": "2024-12-17T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:11189"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-45803"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2246840"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2024-11189.html"
}
],
"related": [
"CVE-2023-45803"
],
"summary": "Moderate: python3.11-urllib3 security update"
}
SUSE-SU-2023:4467-1
Vulnerability from csaf_suse - Published: 2023-11-16 16:58 - Updated: 2023-11-16 16:58| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-urllib3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-urllib3 fixes the following issues:\n\n- CVE-2023-45803: Fix a request body leak that could occur when\n receiving a 303 HTTP response (bsc#1216377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4467,SUSE-SLE-Micro-5.3-2023-4467,SUSE-SLE-Micro-5.4-2023-4467,SUSE-SLE-Micro-5.5-2023-4467,SUSE-SLE-Module-Basesystem-15-SP4-2023-4467,SUSE-SLE-Module-Basesystem-15-SP5-2023-4467,SUSE-SLE-Product-SUSE-Manager-Proxy-4.2-2023-4467,SUSE-SLE-Product-SUSE-Manager-Server-4.2-2023-4467,SUSE-SUSE-MicroOS-5.1-2023-4467,SUSE-SUSE-MicroOS-5.2-2023-4467,openSUSE-Leap-Micro-5.3-2023-4467,openSUSE-Leap-Micro-5.4-2023-4467,openSUSE-SLE-15.4-2023-4467,openSUSE-SLE-15.5-2023-4467",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4467-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4467-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234467-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4467-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017052.html"
},
{
"category": "self",
"summary": "SUSE Bug 1216377",
"url": "https://bugzilla.suse.com/1216377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45803/"
}
],
"title": "Security update for python-urllib3",
"tracking": {
"current_release_date": "2023-11-16T16:58:09Z",
"generator": {
"date": "2023-11-16T16:58:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4467-1",
"initial_release_date": "2023-11-16T16:58:09Z",
"revision_history": [
{
"date": "2023-11-16T16:58:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"product": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"product_id": "python3-urllib3-1.25.10-150300.4.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.2",
"product": {
"name": "SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.2",
"product": {
"name": "SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Manager Proxy 4.2",
"product_id": "SUSE Manager Proxy 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Proxy 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Manager Server 4.2",
"product_id": "SUSE Manager Server 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Manager Server 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45803"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Manager Proxy 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Manager Server 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap 15.4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap 15.5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45803",
"url": "https://www.suse.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "SUSE Bug 1216377 for CVE-2023-45803",
"url": "https://bugzilla.suse.com/1216377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Manager Proxy 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Manager Server 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap 15.4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap 15.5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Manager Proxy 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"SUSE Manager Server 4.2:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap 15.4:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap 15.5:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap Micro 5.3:python3-urllib3-1.25.10-150300.4.9.1.noarch",
"openSUSE Leap Micro 5.4:python3-urllib3-1.25.10-150300.4.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T16:58:09Z",
"details": "moderate"
}
],
"title": "CVE-2023-45803"
}
]
}
SUSE-SU-2023:4356-1
Vulnerability from csaf_suse - Published: 2023-11-03 08:19 - Updated: 2023-11-03 08:19| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-urllib3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-urllib3 fixes the following issues:\n\n- CVE-2023-45803: Fix a request body leak that could occur when\n receiving a 303 HTTP response (bsc#1216377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "HPE-Helion-OpenStack-8-2023-4356,SUSE-2023-4356,SUSE-OpenStack-Cloud-8-2023-4356,SUSE-OpenStack-Cloud-Crowbar-8-2023-4356",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4356-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4356-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234356-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4356-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-November/032594.html"
},
{
"category": "self",
"summary": "SUSE Bug 1216377",
"url": "https://bugzilla.suse.com/1216377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45803/"
}
],
"title": "Security update for python-urllib3",
"tracking": {
"current_release_date": "2023-11-03T08:19:58Z",
"generator": {
"date": "2023-11-03T08:19:58Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4356-1",
"initial_release_date": "2023-11-03T08:19:58Z",
"revision_history": [
{
"date": "2023-11-03T08:19:58Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-1.25.10-5.25.1.noarch",
"product": {
"name": "python-urllib3-1.25.10-5.25.1.noarch",
"product_id": "python-urllib3-1.25.10-5.25.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-urllib3-1.25.10-5.25.1.noarch",
"product": {
"name": "python3-urllib3-1.25.10-5.25.1.noarch",
"product_id": "python3-urllib3-1.25.10-5.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "HPE Helion OpenStack 8",
"product": {
"name": "HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:hpe-helion-openstack:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 8",
"product": {
"name": "SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:8"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 8",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:8"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.25.10-5.25.1.noarch as component of HPE Helion OpenStack 8",
"product_id": "HPE Helion OpenStack 8:python-urllib3-1.25.10-5.25.1.noarch"
},
"product_reference": "python-urllib3-1.25.10-5.25.1.noarch",
"relates_to_product_reference": "HPE Helion OpenStack 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.25.10-5.25.1.noarch as component of SUSE OpenStack Cloud 8",
"product_id": "SUSE OpenStack Cloud 8:python-urllib3-1.25.10-5.25.1.noarch"
},
"product_reference": "python-urllib3-1.25.10-5.25.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.25.10-5.25.1.noarch as component of SUSE OpenStack Cloud Crowbar 8",
"product_id": "SUSE OpenStack Cloud Crowbar 8:python-urllib3-1.25.10-5.25.1.noarch"
},
"product_reference": "python-urllib3-1.25.10-5.25.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45803"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"HPE Helion OpenStack 8:python-urllib3-1.25.10-5.25.1.noarch",
"SUSE OpenStack Cloud 8:python-urllib3-1.25.10-5.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:python-urllib3-1.25.10-5.25.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45803",
"url": "https://www.suse.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "SUSE Bug 1216377 for CVE-2023-45803",
"url": "https://bugzilla.suse.com/1216377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"HPE Helion OpenStack 8:python-urllib3-1.25.10-5.25.1.noarch",
"SUSE OpenStack Cloud 8:python-urllib3-1.25.10-5.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:python-urllib3-1.25.10-5.25.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"HPE Helion OpenStack 8:python-urllib3-1.25.10-5.25.1.noarch",
"SUSE OpenStack Cloud 8:python-urllib3-1.25.10-5.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 8:python-urllib3-1.25.10-5.25.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-03T08:19:58Z",
"details": "moderate"
}
],
"title": "CVE-2023-45803"
}
]
}
SUSE-SU-2023:4352-1
Vulnerability from csaf_suse - Published: 2023-11-02 16:53 - Updated: 2023-11-02 16:53| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-urllib3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-urllib3 fixes the following issues:\n\n- CVE-2023-45803: Fix a request body leak that could occur when\n receiving a 303 HTTP response (bsc#1216377).\n- CVE-2018-25091: Fixed a potential leak of the Authorization header\n during a cross-origin redirect (bsc#1216275).\n- CVE-2023-43804: Fixed a potential cookie leak via HTTP redirect if\n the user manually set the corresponding header (bsc#1215968).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4352,SUSE-OpenStack-Cloud-9-2023-4352,SUSE-OpenStack-Cloud-Crowbar-9-2023-4352",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4352-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4352-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234352-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4352-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2023-November/032586.html"
},
{
"category": "self",
"summary": "SUSE Bug 1215968",
"url": "https://bugzilla.suse.com/1215968"
},
{
"category": "self",
"summary": "SUSE Bug 1216275",
"url": "https://bugzilla.suse.com/1216275"
},
{
"category": "self",
"summary": "SUSE Bug 1216377",
"url": "https://bugzilla.suse.com/1216377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-25091 page",
"url": "https://www.suse.com/security/cve/CVE-2018-25091/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-43804 page",
"url": "https://www.suse.com/security/cve/CVE-2023-43804/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45803/"
}
],
"title": "Security update for python-urllib3",
"tracking": {
"current_release_date": "2023-11-02T16:53:22Z",
"generator": {
"date": "2023-11-02T16:53:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4352-1",
"initial_release_date": "2023-11-02T16:53:22Z",
"revision_history": [
{
"date": "2023-11-02T16:53:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-1.23-3.25.1.noarch",
"product": {
"name": "python-urllib3-1.23-3.25.1.noarch",
"product_id": "python-urllib3-1.23-3.25.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-urllib3-1.23-3.25.1.noarch",
"product": {
"name": "python3-urllib3-1.23-3.25.1.noarch",
"product_id": "python3-urllib3-1.23-3.25.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 9",
"product": {
"name": "SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:9"
}
}
},
{
"category": "product_name",
"name": "SUSE OpenStack Cloud Crowbar 9",
"product": {
"name": "SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud-crowbar:9"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.23-3.25.1.noarch as component of SUSE OpenStack Cloud 9",
"product_id": "SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch"
},
"product_reference": "python-urllib3-1.23-3.25.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 9"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.23-3.25.1.noarch as component of SUSE OpenStack Cloud Crowbar 9",
"product_id": "SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
},
"product_reference": "python-urllib3-1.23-3.25.1.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud Crowbar 9"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-25091",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-25091"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 before 1.24.2 does not remove the authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the authorization header to be exposed to unintended hosts or transmitted in cleartext. NOTE: this issue exists because of an incomplete fix for CVE-2018-20060 (which was case-sensitive).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-25091",
"url": "https://www.suse.com/security/cve/CVE-2018-25091"
},
{
"category": "external",
"summary": "SUSE Bug 1216275 for CVE-2018-25091",
"url": "https://bugzilla.suse.com/1216275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-02T16:53:22Z",
"details": "moderate"
}
],
"title": "CVE-2018-25091"
},
{
"cve": "CVE-2023-43804",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-43804"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 doesn\u0027t treat the `Cookie` HTTP header special or provide any helpers for managing cookies over HTTP, that is the responsibility of the user. However, it is possible for a user to specify a `Cookie` header and unknowingly leak information via HTTP redirects to a different origin if that user doesn\u0027t disable redirects explicitly. This issue has been patched in urllib3 version 1.26.17 or 2.0.5.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-43804",
"url": "https://www.suse.com/security/cve/CVE-2023-43804"
},
{
"category": "external",
"summary": "SUSE Bug 1215968 for CVE-2023-43804",
"url": "https://bugzilla.suse.com/1215968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-02T16:53:22Z",
"details": "moderate"
}
],
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-45803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45803"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45803",
"url": "https://www.suse.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "SUSE Bug 1216377 for CVE-2023-45803",
"url": "https://bugzilla.suse.com/1216377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE OpenStack Cloud 9:python-urllib3-1.23-3.25.1.noarch",
"SUSE OpenStack Cloud Crowbar 9:python-urllib3-1.23-3.25.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-02T16:53:22Z",
"details": "moderate"
}
],
"title": "CVE-2023-45803"
}
]
}
SUSE-SU-2023:4468-1
Vulnerability from csaf_suse - Published: 2023-11-16 16:59 - Updated: 2023-11-16 16:59| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-urllib3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-urllib3 fixes the following issues:\n\n- CVE-2023-45803: Fix a request body leak that could occur when\n receiving a 303 HTTP response (bsc#1216377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4468,SUSE-SLE-Module-Public-Cloud-12-2023-4468,SUSE-SLE-SDK-12-SP5-2023-4468,SUSE-SLE-SERVER-12-SP5-2023-4468,SUSE-SLE-WE-12-SP5-2023-4468",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4468-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4468-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234468-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4468-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017051.html"
},
{
"category": "self",
"summary": "SUSE Bug 1216377",
"url": "https://bugzilla.suse.com/1216377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45803/"
}
],
"title": "Security update for python-urllib3",
"tracking": {
"current_release_date": "2023-11-16T16:59:00Z",
"generator": {
"date": "2023-11-16T16:59:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4468-1",
"initial_release_date": "2023-11-16T16:59:00Z",
"revision_history": [
{
"date": "2023-11-16T16:59:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python-urllib3-1.25.10-3.37.1.noarch",
"product": {
"name": "python-urllib3-1.25.10-3.37.1.noarch",
"product_id": "python-urllib3-1.25.10-3.37.1.noarch"
}
},
{
"category": "product_version",
"name": "python3-urllib3-1.25.10-3.37.1.noarch",
"product": {
"name": "python3-urllib3-1.25.10-3.37.1.noarch",
"product_id": "python3-urllib3-1.25.10-3.37.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:12"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Module for Public Cloud 12",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-3.37.1.noarch as component of SUSE Linux Enterprise Workstation Extension 12 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-3.37.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45803"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45803",
"url": "https://www.suse.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "SUSE Bug 1216377 for CVE-2023-45803",
"url": "https://bugzilla.suse.com/1216377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 12:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Module for Public Cloud 12:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Software Development Kit 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch",
"SUSE Linux Enterprise Workstation Extension 12 SP5:python3-urllib3-1.25.10-3.37.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-16T16:59:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-45803"
}
]
}
SUSE-SU-2024:2462-1
Vulnerability from csaf_suse - Published: 2024-07-12 13:55 - Updated: 2024-07-12 13:55| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-urllib3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-urllib3 fixes the following issues:\n\n- CVE-2023-45803: Fix a request body leak that could occur when\n receiving a 303 HTTP response (bsc#1216377).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-2462,SUSE-SLE-Micro-5.5-2024-2462",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2462-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:2462-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242462-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:2462-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2024-July/035989.html"
},
{
"category": "self",
"summary": "SUSE Bug 1216377",
"url": "https://bugzilla.suse.com/1216377"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-45803 page",
"url": "https://www.suse.com/security/cve/CVE-2023-45803/"
}
],
"title": "Security update for python-urllib3",
"tracking": {
"current_release_date": "2024-07-12T13:55:02Z",
"generator": {
"date": "2024-07-12T13:55:02Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:2462-1",
"initial_release_date": "2024-07-12T13:55:02Z",
"revision_history": [
{
"date": "2024-07-12T13:55:02Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"product": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"product_id": "python3-urllib3-1.25.10-150300.4.9.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-urllib3-1.25.10-150300.4.9.1.noarch as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch"
},
"product_reference": "python3-urllib3-1.25.10-150300.4.9.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-45803"
}
],
"notes": [
{
"category": "general",
"text": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-45803",
"url": "https://www.suse.com/security/cve/CVE-2023-45803"
},
{
"category": "external",
"summary": "SUSE Bug 1216377 for CVE-2023-45803",
"url": "https://bugzilla.suse.com/1216377"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:python3-urllib3-1.25.10-150300.4.9.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-12T13:55:02Z",
"details": "moderate"
}
],
"title": "CVE-2023-45803"
}
]
}
NCSC-2025-0028
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:36 - Updated: 2025-01-22 13:36| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Analytics producten, zoals Business Intelligence, Analytics Desktop en BI Publisher.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of zich toegang te verschaffen tot gevoelige gegevens.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "CWE-399",
"title": "CWE-399"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Analytics",
"tracking": {
"current_release_date": "2025-01-22T13:36:58.196605Z",
"id": "NCSC-2025-0028",
"initial_release_date": "2025-01-22T13:36:58.196605Z",
"revision_history": [
{
"date": "2025-01-22T13:36:58.196605Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-220360",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:enterprise:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-135810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-219994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:enterprise:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-219817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:6.4.0.0.0:enterprise:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-257324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1650736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764236",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-1503574",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-1503573",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764727",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764725",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764728",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764730",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764726",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_service_administration_ui___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_storage_service_integration___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-9197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-9493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-228391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-1673195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1751172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1650735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_7.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1751157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_8.1.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10000",
"references": [
{
"category": "self",
"summary": "CVE-2016-10000",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2016/CVE-2016-10000.json"
}
],
"title": "CVE-2016-10000"
},
{
"cve": "CVE-2020-2849",
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-2849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-2849.json"
}
],
"title": "CVE-2020-2849"
},
{
"cve": "CVE-2020-7760",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-7760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-7760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-257324"
]
}
],
"title": "CVE-2020-7760"
},
{
"cve": "CVE-2020-13956",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-1503574",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13956",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13956.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-1503574",
"CSAFPID-257324",
"CSAFPID-135810"
]
}
],
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-28975",
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-28975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2020-28975"
},
{
"cve": "CVE-2021-23926",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-23926",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23926.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930"
]
}
],
"title": "CVE-2021-23926"
},
{
"cve": "CVE-2021-33813",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9197",
"CSAFPID-9493",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-33813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-33813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9197",
"CSAFPID-9493",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-135810"
]
}
],
"title": "CVE-2021-33813"
},
{
"cve": "CVE-2022-40150",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40150",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40150.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
}
],
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "other",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4785",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4785",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4785.json"
}
],
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-7272",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7272.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-7272"
},
{
"cve": "CVE-2023-24998",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-399",
"title": "CWE-399"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-24998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json"
}
],
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-25399",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-25399",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-25399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-25399"
},
{
"cve": "CVE-2023-29824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29824",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29824.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-29824"
},
{
"cve": "CVE-2023-32732",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32732",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32732.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-33202",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650735",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33202",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33202.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650735",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-33202"
},
{
"cve": "CVE-2023-33953",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33953",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2023-50782",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-50782",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50782.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-50782"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-1135",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-1135"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-36114",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36114",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36114.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-36114"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-43382",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43382",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43382.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-43382"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2025-21532",
"product_status": {
"known_affected": [
"CSAFPID-1751157"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21532",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21532.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751157"
]
}
],
"title": "CVE-2025-21532"
}
]
}
MSRC_CVE-2023-45803
Vulnerability from csaf_microsoft - Published: 2023-10-01 00:00 - Updated: 2026-02-20 23:15| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45803 Request body not stripped after redirect in urllib3 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-45803.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Request body not stripped after redirect in urllib3",
"tracking": {
"current_release_date": "2026-02-20T23:15:38.000Z",
"generator": {
"date": "2026-02-21T02:42:38.597Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-45803",
"initial_release_date": "2023-10-01T00:00:00.000Z",
"revision_history": [
{
"date": "2023-10-23T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-08-29T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2024-08-30T00:00:00.000Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Information published."
},
{
"date": "2024-08-31T00:00:00.000Z",
"legacy_version": "1.3",
"number": "4",
"summary": "Information published."
},
{
"date": "2024-09-01T00:00:00.000Z",
"legacy_version": "1.4",
"number": "5",
"summary": "Information published."
},
{
"date": "2024-09-02T00:00:00.000Z",
"legacy_version": "1.5",
"number": "6",
"summary": "Information published."
},
{
"date": "2024-09-03T00:00:00.000Z",
"legacy_version": "1.6",
"number": "7",
"summary": "Information published."
},
{
"date": "2024-09-05T00:00:00.000Z",
"legacy_version": "1.7",
"number": "8",
"summary": "Information published."
},
{
"date": "2024-09-06T00:00:00.000Z",
"legacy_version": "1.8",
"number": "9",
"summary": "Information published."
},
{
"date": "2024-09-07T00:00:00.000Z",
"legacy_version": "1.9",
"number": "10",
"summary": "Information published."
},
{
"date": "2024-09-08T00:00:00.000Z",
"legacy_version": "2",
"number": "11",
"summary": "Information published."
},
{
"date": "2024-09-11T00:00:00.000Z",
"legacy_version": "2.1",
"number": "12",
"summary": "Information published."
},
{
"date": "2024-10-25T00:00:00.000Z",
"legacy_version": "2.2",
"number": "13",
"summary": "Added python-pip to Azure Linux 3.0\nAdded python-urllib3 to Azure Linux 3.0\nAdded python-urllib3 to CBL-Mariner 2.0"
},
{
"date": "2025-03-14T00:00:00.000Z",
"legacy_version": "2.3",
"number": "14",
"summary": "Added python3 to Azure Linux 3.0\nAdded python-pip to Azure Linux 3.0\nAdded python-urllib3 to Azure Linux 3.0\nAdded python-urllib3 to CBL-Mariner 2.0"
},
{
"date": "2025-07-18T00:00:00.000Z",
"legacy_version": "3",
"number": "15",
"summary": "Added python3 to CBL-Mariner 2.0\nAdded python-urllib3 to CBL-Mariner 2.0\nAdded python3 to Azure Linux 3.0\nAdded python-pip to Azure Linux 3.0\nAdded python-urllib3 to Azure Linux 3.0"
},
{
"date": "2026-02-20T23:15:38.000Z",
"legacy_version": "4",
"number": "16",
"summary": "Information published."
}
],
"status": "final",
"version": "16"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 python-urllib3 2.0.4-1",
"product": {
"name": "\u003cazl3 python-urllib3 2.0.4-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 python-urllib3 2.0.4-1",
"product": {
"name": "azl3 python-urllib3 2.0.4-1",
"product_id": "20028"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 python-urllib3 1.26.18-1",
"product": {
"name": "\u003ccbl2 python-urllib3 1.26.18-1",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "cbl2 python-urllib3 1.26.18-1",
"product": {
"name": "cbl2 python-urllib3 1.26.18-1",
"product_id": "18017"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python-urllib3 2.0.7-1",
"product": {
"name": "\u003cazl3 python-urllib3 2.0.7-1",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "azl3 python-urllib3 2.0.7-1",
"product": {
"name": "azl3 python-urllib3 2.0.7-1",
"product_id": "17714"
}
}
],
"category": "product_name",
"name": "python-urllib3"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 python-pip 24.2-1",
"product": {
"name": "\u003cazl3 python-pip 24.2-1",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "azl3 python-pip 24.2-1",
"product": {
"name": "azl3 python-pip 24.2-1",
"product_id": "17690"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 python-pip 24.0-2",
"product": {
"name": "\u003cazl3 python-pip 24.0-2",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "azl3 python-pip 24.0-2",
"product": {
"name": "azl3 python-pip 24.0-2",
"product_id": "17693"
}
}
],
"category": "product_name",
"name": "python-pip"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 python-virtualenv 20.26.6-1",
"product": {
"name": "\u003ccbl2 python-virtualenv 20.26.6-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 python-virtualenv 20.26.6-1",
"product": {
"name": "cbl2 python-virtualenv 20.26.6-1",
"product_id": "19849"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 python-virtualenv 20.26.6-1",
"product": {
"name": "\u003ccbl2 python-virtualenv 20.26.6-1",
"product_id": "11"
}
},
{
"category": "product_version",
"name": "cbl2 python-virtualenv 20.26.6-1",
"product": {
"name": "cbl2 python-virtualenv 20.26.6-1",
"product_id": "17171"
}
}
],
"category": "product_name",
"name": "python-virtualenv"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 python3 3.9.19-13",
"product": {
"name": "\u003ccbl2 python3 3.9.19-13",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 python3 3.9.19-13",
"product": {
"name": "cbl2 python3 3.9.19-13",
"product_id": "19681"
}
}
],
"category": "product_name",
"name": "python3"
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "azl3 python3 3.12.3-5",
"product": {
"name": "azl3 python3 3.12.3-5",
"product_id": "10"
}
},
{
"category": "product_name",
"name": "azl3 mozjs 102.15.1-1",
"product": {
"name": "azl3 mozjs 102.15.1-1",
"product_id": "4"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-urllib3 2.0.4-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-urllib3 2.0.4-1 as a component of Azure Linux 3.0",
"product_id": "20028-17084"
},
"product_reference": "20028",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-9"
},
"product_reference": "9",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python3 3.12.3-5 as a component of Azure Linux 3.0",
"product_id": "17084-10"
},
"product_reference": "10",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python-urllib3 1.26.18-1 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-urllib3 1.26.18-1 as a component of CBL Mariner 2.0",
"product_id": "18017-17086"
},
"product_reference": "18017",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-pip 24.2-1 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-pip 24.2-1 as a component of Azure Linux 3.0",
"product_id": "17690-17084"
},
"product_reference": "17690",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-urllib3 2.0.7-1 as a component of Azure Linux 3.0",
"product_id": "17084-6"
},
"product_reference": "6",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-urllib3 2.0.7-1 as a component of Azure Linux 3.0",
"product_id": "17714-17084"
},
"product_reference": "17714",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 python-pip 24.0-2 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-pip 24.0-2 as a component of Azure Linux 3.0",
"product_id": "17693-17084"
},
"product_reference": "17693",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 mozjs 102.15.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python-virtualenv 20.26.6-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-virtualenv 20.26.6-1 as a component of CBL Mariner 2.0",
"product_id": "19849-17086"
},
"product_reference": "19849",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python3 3.9.19-13 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python3 3.9.19-13 as a component of CBL Mariner 2.0",
"product_id": "19681-17086"
},
"product_reference": "19681",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 python-virtualenv 20.26.6-1 as a component of CBL Mariner 2.0",
"product_id": "17086-11"
},
"product_reference": "11",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-virtualenv 20.26.6-1 as a component of CBL Mariner 2.0",
"product_id": "17171-17086"
},
"product_reference": "17171",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-9",
"17084-10",
"17084-4"
]
}
],
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20028-17084",
"18017-17086",
"17690-17084",
"17714-17084",
"17693-17084",
"19849-17086",
"19681-17086",
"17171-17086"
],
"known_affected": [
"17084-1",
"17086-5",
"17084-8",
"17084-6",
"17084-7",
"17086-2",
"17086-3",
"17086-11"
],
"known_not_affected": [
"17084-9",
"17084-10",
"17084-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45803 Request body not stripped after redirect in urllib3 - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-45803.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-10-23T00:00:00.000Z",
"details": "2.0.7-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17084-6"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-10-23T00:00:00.000Z",
"details": "1.26.18-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-5"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-10-23T00:00:00.000Z",
"details": "24.2-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-8",
"17084-7"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-10-23T00:00:00.000Z",
"details": "Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-10-23T00:00:00.000Z",
"details": "3.9.19-14:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"temporalScore": 4.2,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"17084-1",
"17086-5",
"17084-8",
"17084-6",
"17084-7",
"17086-2",
"17086-3",
"17086-11"
]
}
],
"title": "Request body not stripped after redirect in urllib3"
}
]
}
PYSEC-2023-212
Vulnerability from pysec - Published: 2023-10-17 20:15 - Updated: 2023-10-25 18:28urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn't remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like POST) to GET as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren't putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn't exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren't expecting to respond with redirects with redirects=False and disable automatic redirects with redirects=False and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.
| Name | purl | urllib3 | pkg:pypi/urllib3 |
|---|
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "urllib3",
"purl": "pkg:pypi/urllib3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "4e98d57809dacab1cbe625fddeec1a290c478ea9"
}
],
"repo": "https://github.com/urllib3/urllib3",
"type": "GIT"
},
{
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.0.7"
},
{
"introduced": "0"
},
{
"fixed": "1.26.18"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.2",
"0.3",
"0.3.1",
"0.4.0",
"0.4.1",
"1.0",
"1.0.1",
"1.0.2",
"1.1",
"1.10",
"1.10.1",
"1.10.2",
"1.10.3",
"1.10.4",
"1.11",
"1.12",
"1.13",
"1.13.1",
"1.14",
"1.15",
"1.15.1",
"1.16",
"1.17",
"1.18",
"1.18.1",
"1.19",
"1.19.1",
"1.2",
"1.2.1",
"1.2.2",
"1.20",
"1.21",
"1.21.1",
"1.22",
"1.23",
"1.24",
"1.24.1",
"1.24.2",
"1.24.3",
"1.25",
"1.25.1",
"1.25.10",
"1.25.11",
"1.25.2",
"1.25.3",
"1.25.4",
"1.25.5",
"1.25.6",
"1.25.7",
"1.25.8",
"1.25.9",
"1.26.0",
"1.26.1",
"1.26.10",
"1.26.11",
"1.26.12",
"1.26.13",
"1.26.14",
"1.26.15",
"1.26.16",
"1.26.17",
"1.26.2",
"1.26.3",
"1.26.4",
"1.26.5",
"1.26.6",
"1.26.7",
"1.26.8",
"1.26.9",
"1.3",
"1.4",
"1.5",
"1.6",
"1.7",
"1.7.1",
"1.8",
"1.8.2",
"1.8.3",
"1.9",
"1.9.1",
"2.0.0",
"2.0.1",
"2.0.2",
"2.0.3",
"2.0.4",
"2.0.5",
"2.0.6"
]
}
],
"aliases": [
"CVE-2023-45803",
"GHSA-g4mx-q9vg-27p4"
],
"details": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.\n",
"id": "PYSEC-2023-212",
"modified": "2023-10-25T18:28:34.811764+00:00",
"published": "2023-10-17T20:15:00+00:00",
"references": [
{
"type": "ADVISORY",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"type": "WEB",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
},
{
"type": "FIX",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"type": "ARTICLE",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
}
],
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2023-45803
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-45803",
"id": "GSD-2023-45803"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-45803"
],
"details": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.\n",
"id": "GSD-2023-45803",
"modified": "2023-12-13T01:20:38.306053Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-45803",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "urllib3",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003e= 2.0.0, \u003c 2.0.7"
},
{
"version_affected": "=",
"version_value": "\u003c 1.26.18"
}
]
}
}
]
},
"vendor_name": "urllib3"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.\n"
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-200",
"lang": "eng",
"value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"refsource": "MISC",
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"name": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"refsource": "MISC",
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"name": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"refsource": "MISC",
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
}
]
},
"source": {
"advisory": "GHSA-g4mx-q9vg-27p4",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.0.7",
"versionStartIncluding": "2.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:python:urllib3:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.26.18",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-45803"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "urllib3 is a user-friendly HTTP client library for Python. urllib3 previously wouldn\u0027t remove the HTTP request body when an HTTP redirect response using status 301, 302, or 303 after the request had its method changed from one that could accept a request body (like `POST`) to `GET` as is required by HTTP RFCs. Although this behavior is not specified in the section for redirects, it can be inferred by piecing together information from different sections and we have observed the behavior in other major HTTP client implementations like curl and web browsers. Because the vulnerability requires a previously trusted service to become compromised in order to have an impact on confidentiality we believe the exploitability of this vulnerability is low. Additionally, many users aren\u0027t putting sensitive data in HTTP request bodies, if this is the case then this vulnerability isn\u0027t exploitable. Both of the following conditions must be true to be affected by this vulnerability: 1. Using urllib3 and submitting sensitive information in the HTTP request body (such as form data or JSON) and 2. The origin service is compromised and starts redirecting using 301, 302, or 303 to a malicious peer or the redirected-to service becomes compromised. This issue has been addressed in versions 1.26.18 and 2.0.7 and users are advised to update to resolve this issue. Users unable to update should disable redirects for services that aren\u0027t expecting to respond with redirects with `redirects=False` and disable automatic redirects with `redirects=False` and handle 301, 302, and 303 redirects manually by stripping the HTTP request body.\n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://github.com/urllib3/urllib3/security/advisories/GHSA-g4mx-q9vg-27p4"
},
{
"name": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get"
},
{
"name": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9",
"refsource": "MISC",
"tags": [
"Patch"
],
"url": "https://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/",
"refsource": "MISC",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PPDPLM6UUMN55ESPQWJFLLIZY4ZKCNRX/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/",
"refsource": "MISC",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4R2Y5XK3WALSR3FNAGN7JBYV2B343ZKB/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/",
"refsource": "MISC",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5F5CUBAN5XMEBVBZPHFITBLMJV5FIJJ5/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-11-03T22:15Z",
"publishedDate": "2023-10-17T20:15Z"
}
}
}
BDU:2023-06977
Vulnerability from fstec - Published: 17.10.2023{
"CVSS 2.0": "AV:A/AC:H/Au:M/C:C/I:N/A:N",
"CVSS 3.0": "AV:A/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb, Andrey Petrov",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb), 7.3 (\u0420\u0415\u0414 \u041e\u0421), 1.7 (Astra Linux Special Edition), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 4.7 (Astra Linux Special Edition), 2.1 (ROSA Virtualization), - (\u0410\u041b\u042c\u0422 \u0421\u041f 10), \u0434\u043e 1.26.17 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (urllib3), \u0434\u043e 2.0.6 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (urllib3)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u0430\u0446\u0438\u0438 \u0434\u043b\u044f \u0441\u043b\u0443\u0436\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u0435, \u043a\u0430\u043a \u0432\u044b \u043e\u0436\u0438\u0434\u0430\u0435\u0442\u0435, \u043d\u0435 \u0431\u0443\u0434\u0443\u0442 \u043e\u0442\u0432\u0435\u0447\u0430\u0442\u044c \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u0430\u0446\u0438\u044f\u043c\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e redirects=False;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e redirects=False \u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u0430\u0439\u0442\u0435 303 \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u0440\u0443\u0447\u043d\u0443\u044e, \u0443\u0434\u0430\u043b\u0438\u0432 \u0442\u0435\u043b\u043e HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u0430.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 urllib3 (1.26.18 \u0438\u043b\u0438 2.0.7).\n\n\u0414\u043b\u044f \u0420\u0435\u0434\u041e\u0421: http://repo.red-soft.ru/redos/7.3c/x86_64/updates/\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 python-urllib3 \u0434\u043e 1.25.8-2+ci202405311436+astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17\n\n\u0414\u043b\u044f Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb::\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 python-urllib3 \u0434\u043e 1.19.1-1+deb9u2+ci202406111900+astra2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16\n\n\u0414\u043b\u044f Astra Linux Special Edition 4.7 \u0434\u043b\u044f \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b ARM:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 python-urllib3 \u0434\u043e 1.25.8-2+ci202405311436+astra1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430\n\n\u0414\u043b\u044f \u041e\u0421 Astra Linux:\n\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0430\u043a\u0435\u0442 python-urllib3 \u0434\u043e 1.19.1-1+deb9u2+ci202406111900+astra2 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f: https://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81\n\n\u0414\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0440\u0435\u0434\u043e\u0439 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u00abROSA Virtualization\u00bb: https://abf.rosa.ru/advisories/ROSA-SA-2024-2497\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0440\u0435\u043b\u0438\u0437 10): \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430: https://altsp.su/obnovleniya-bezopasnosti/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "17.10.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "08.04.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "21.10.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-06977",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-45803",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u0420\u0415\u0414 \u041e\u0421 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), ROSA Virtualization (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165091), \u0410\u041b\u042c\u0422 \u0421\u041f 10, urllib3",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition \u0434\u043b\u044f \u00ab\u042d\u043b\u044c\u0431\u0440\u0443\u0441\u00bb 8.1 \u00ab\u041b\u0435\u043d\u0438\u043d\u0433\u0440\u0430\u0434\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u211611156), \u041e\u041e\u041e \u00ab\u0420\u0435\u0434 \u0421\u043e\u0444\u0442\u00bb \u0420\u0415\u0414 \u041e\u0421 7.3 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21163751), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.7 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 4.7 ARM (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb ROSA Virtualization 2.1 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21165091), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u041b\u042c\u0422 \u0421\u041f 10 - ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f urllib3 \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0430\u0442\u043e\u0440\u0430 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Python, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u044f urllib3 \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0430\u0442\u043e\u0440\u0430 \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Python \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.rfc-editor.org/rfc/rfc9110.html#name-get\nhttps://github.com/urllib3/urllib3/commit/4e98d57809dacab1cbe625fddeec1a290c478ea9\nhttps://www.rfc-editor.org/rfc/rfc9110.html#name-get\nhttps://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20241017SE16\nhttps://wiki.astralinux.ru/astra-linux-se47-bulletin-2024-1031SE47\nhttps://altsp.su/obnovleniya-bezopasnosti/\nhttps://huntr.com/bounties/65563cbd-0577-4737-847a-0401921243bd/?__hstc=79449099.f7d3f20db1bfaa4204b84306ed5e45da.1733330123520.1733330123520.1733330123520.1\u0026__hssc=79449099.2.1733330123520\u0026__hsfp=683428783\u0026_gl=1*xrkgpt*_ga*MTI1NTA5MDQ4MC4xNzMzMzMwMTEz*_ga_MT9HL3EKXV*MTczMzMzMDExMi4xLjEuMTczMzMzMDQwOC40MS4wLjE3MjI4MDQ2NTY.\nhttps://wiki.astralinux.ru/astra-linux-se81-bulletin-20241206SE81\nhttps://abf.rosa.ru/advisories/ROSA-SA-2024-2497\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,2)"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.